antire-book / antire_bookLinks
Example code from "Programming Linux Anti-Reversing Techniques"
☆98Updated 8 years ago
Alternatives and similar repositories for antire_book
Users that are interested in antire_book are comparing it to the libraries listed below
Sorting:
- A set of scripts for a radare-based malware code analysis workflow☆68Updated 6 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆51Updated 7 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆71Updated 8 years ago
- grap: define and match graph patterns within binaries☆173Updated 4 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 10 years ago
- Attacking the Core associated source files☆88Updated 8 years ago
- r2con 2017 September 6-9☆97Updated 8 years ago
- Implementation of the SMM rootkit "The Watcher"☆130Updated 3 years ago
- A Python tool to generate ROP chains☆64Updated 10 months ago
- Personal repository for all ctf related stuffs☆67Updated last year
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆94Updated last month
- ☆49Updated 7 years ago
- Melkor is a very intuitive and easy-to-use ELF file format fuzzer to find functional and security bugs in ELF parsers.☆153Updated 2 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- C++-based shellcode builder☆115Updated 5 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Updated 4 years ago
- Library for creating CTF services.☆75Updated 9 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- A novel technique to hide code from debuggers & disassemblers☆159Updated last year
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago
- Advanced buffer overflow and memory corruption security challenges☆190Updated 3 years ago
- Symbolic Execution Tool in r2☆106Updated 3 years ago
- IDAtropy is a plugin for Hex-Ray's IDA Pro designed to generate charts of entropy and histograms using the power of idapython and matplot…☆142Updated 4 years ago
- Binary Ninja plugin to decompile binaries using RetDec API☆165Updated 7 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Updated 7 years ago
- WinHeap Explorer repository.☆119Updated 7 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- Tool to make in memory man in the middle☆125Updated 7 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago