Trigleos / ELFREVGOLinks
Anti-analysis tool that obfuscates ELF files
☆36Updated 4 years ago
Alternatives and similar repositories for ELFREVGO
Users that are interested in ELFREVGO are comparing it to the libraries listed below
Sorting:
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆137Updated 6 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 4 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆95Updated last month
- Kernel Read Write Execute☆46Updated 11 months ago
- Binary Ninja plugin to deobfuscate strings obfuscated with the Garble project☆39Updated 9 months ago
- ASLR bypass without infoleak☆163Updated 4 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆63Updated 2 years ago
- ☆80Updated last year
- ☆22Updated 2 weeks ago
- Userland exec PoC to be used as attack vector technique☆94Updated last month
- Binary Exploitation Phrack CTF Challenge☆70Updated 3 months ago
- ☆86Updated last year
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆65Updated last year
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- Ghidra scripts for recovering string definitions in Go binaries☆125Updated 3 weeks ago
- Assisting Go Analysis and Reversing☆91Updated last month
- ☆109Updated 3 years ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆95Updated 5 months ago
- Binary Exploitation Phrack CTF Challenge☆139Updated 3 months ago
- MCP for Pwn☆166Updated last week
- DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and revers…☆270Updated 2 weeks ago
- Tools to bypass flawed SELinux policies using the init_module system call☆59Updated 2 years ago
- ☆39Updated last year
- V8sandbox_bypass using stack misalignment☆23Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated last year
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49Updated last year
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆49Updated 6 months ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆161Updated last week
- Python tool to resolve all strings in Go binaries obfuscated by garble☆154Updated 9 months ago