PacktPublishing / Learning-Linux-Binary-AnalysisLinks
Learning Linux Binary Analysis, published by Packt
☆86Updated 2 years ago
Alternatives and similar repositories for Learning-Linux-Binary-Analysis
Users that are interested in Learning-Linux-Binary-Analysis are comparing it to the libraries listed below
Sorting:
- My own versions from the programs of the book "Practical Binary Analysis"☆55Updated 6 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆111Updated 5 years ago
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆32Updated 2 years ago
- Changing memory protection in an arbitrary process☆47Updated 7 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 5 years ago
- A collection of Linux kernel rootkits found across the internet taken and put together☆89Updated 3 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆45Updated 7 years ago
- A tiny debugger implement the GDB Remote Serial Protocol. Can work on i386, x86_64, ARM and PowerPC.☆175Updated 3 years ago
- A collection of solutions and other inspiring material to Dennis Andriesse's 'Practical Binary Analysis' book.☆35Updated 4 years ago
- A small fun project to protect a file from writing using ftrace hooking.☆24Updated 4 years ago
- POSIX Function tracing☆338Updated 8 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- (Linux Kernel) Stack Monitoring Tool☆48Updated 3 years ago
- A function tracer☆92Updated 6 years ago
- Collection of simple anti-debugging tricks for Linux☆59Updated 7 years ago
- ☆39Updated 3 years ago
- IDA SIG files for multiarch uClibc library☆38Updated 7 years ago
- Obfuscates dynamic symbol table☆136Updated 6 years ago
- Linux Exploits☆139Updated 10 years ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆159Updated 3 years ago
- Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.☆81Updated 4 years ago
- Recover 64 bit ELF executables from memory dump☆92Updated 7 years ago
- Code injector for ELF binaries (incl. PIE)☆28Updated 8 years ago
- Scripts I made to aid me in everyday reversing or just for fun...☆35Updated 6 years ago
- LKRG bypass methods☆73Updated 5 years ago
- A small kernel module that can hook arbitrary syscalls on x86_64☆52Updated 6 years ago
- Пример руткита для ядра линукс 5☆19Updated 5 years ago
- ELF packer - x86_64☆73Updated 10 years ago
- Examples for Linux ptrace(2)☆135Updated last year
- Linux based inter-process code injection without ptrace(2)☆254Updated 8 years ago