Linux bind shell with anti-reverse engineering techniques
☆295Feb 9, 2017Updated 9 years ago
Alternatives and similar repositories for dont_panic
Users that are interested in dont_panic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example code from "Programming Linux Anti-Reversing Techniques"☆102Feb 9, 2017Updated 9 years ago
- Unofficial American Fuzzy Lop repo☆25Aug 5, 2016Updated 9 years ago
- add symbols back into a stripped ELF binary (~strip)☆176Aug 8, 2017Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆288May 24, 2016Updated 9 years ago
- Cross Architecture Shellcode in C☆209Aug 24, 2016Updated 9 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Feb 9, 2018Updated 8 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆977Dec 11, 2020Updated 5 years ago
- binary patching from Python☆639Jul 6, 2023Updated 2 years ago
- This project has been moved to:☆1,459Apr 7, 2021Updated 5 years ago
- Automated Exploit generation with WinDBG☆191Oct 18, 2016Updated 9 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆411Apr 21, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆160Jul 4, 2016Updated 9 years ago
- Basic command line, text-based, shellcode debugger.☆92Jul 2, 2017Updated 8 years ago
- HORSEPILL rootkit PoC☆234Aug 5, 2016Updated 9 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆241Nov 19, 2025Updated 4 months ago
- An evolutionary knowledge-based fuzzer☆272May 5, 2024Updated last year
- Various snippets created during malware analysis☆466Oct 3, 2025Updated 6 months ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆416Jan 2, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.