PacktPublishing / Learning-Linux-Binary-AnalysisLinks
Learning Linux Binary Analysis, published by Packt
☆86Updated 2 years ago
Alternatives and similar repositories for Learning-Linux-Binary-Analysis
Users that are interested in Learning-Linux-Binary-Analysis are comparing it to the libraries listed below
Sorting:
- A collection of solutions and other inspiring material to Dennis Andriesse's 'Practical Binary Analysis' book.☆34Updated 4 years ago
- A small fun project to protect a file from writing using ftrace hooking.☆24Updated 4 years ago
- My own versions from the programs of the book "Practical Binary Analysis"☆55Updated 6 years ago
- POSIX Function tracing☆339Updated 8 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆111Updated 5 years ago
- Code injector for ELF binaries (incl. PIE)☆28Updated 8 years ago
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆32Updated 2 years ago
- Collection of Linux Kernel Modules and PoC to discover, learn and practice Linux Kernel Development☆54Updated 5 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- A tiny debugger implement the GDB Remote Serial Protocol. Can work on i386, x86_64, ARM and PowerPC.☆170Updated 3 years ago
- A collection of Linux kernel rootkits found across the internet taken and put together☆85Updated 3 years ago
- (Linux Kernel) Stack Monitoring Tool☆47Updated 3 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 5 years ago
- ugly code to check linux kernel memory and dump some internal structures☆48Updated 10 months ago
- Changing memory protection in an arbitrary process☆47Updated 6 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆45Updated 6 years ago
- Collection of simple anti-debugging tricks for Linux☆58Updated 7 years ago
- ELF DSO injector☆68Updated 3 months ago
- bash script and modified java program to headlessly use ghidra's decompiler☆58Updated 3 years ago
- Example of using ELF hacking to inject malicious code into a target binary☆22Updated 5 years ago
- LKRG bypass methods☆73Updated 5 years ago
- Obfuscates dynamic symbol table☆135Updated 6 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Updated 4 years ago
- Extra goodies for GEF to (try to) make GDB suck even less☆168Updated 7 months ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated 4 months ago
- Curated collection of resources, examples and scripts for Linux kernel devs, researchers and hobbyists.☆59Updated 2 years ago
- As near as possible to bare metal☆48Updated 2 months ago
- Linux kernel exploitation experiments☆354Updated last week
- Diary of a reverse-engineer blog☆20Updated 2 years ago
- Пример руткита для ядра линукс 5☆19Updated 4 years ago