Linux bind shell with anti-reverse engineering techniques
☆292Feb 9, 2017Updated 9 years ago
Alternatives and similar repositories for dont_panic
Users that are interested in dont_panic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example code from "Programming Linux Anti-Reversing Techniques"☆102Feb 9, 2017Updated 9 years ago
- Unofficial American Fuzzy Lop repo☆25Aug 5, 2016Updated 9 years ago
- add symbols back into a stripped ELF binary (~strip)☆177Aug 8, 2017Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆288May 24, 2016Updated 9 years ago
- Cross Architecture Shellcode in C☆209Aug 24, 2016Updated 9 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Feb 9, 2018Updated 8 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆974Dec 11, 2020Updated 5 years ago
- binary patching from Python☆639Jul 6, 2023Updated 2 years ago
- This project has been moved to:☆1,459Apr 7, 2021Updated 4 years ago
- Automated Exploit generation with WinDBG☆190Oct 18, 2016Updated 9 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆160Jul 4, 2016Updated 9 years ago
- Basic command line, text-based, shellcode debugger.☆92Jul 2, 2017Updated 8 years ago
- HORSEPILL rootkit PoC☆234Aug 5, 2016Updated 9 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆241Nov 19, 2025Updated 4 months ago
- An evolutionary knowledge-based fuzzer☆272May 5, 2024Updated last year
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆415Jan 2, 2020Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆232Jan 18, 2024Updated 2 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆145Jul 22, 2016Updated 9 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Feb 25, 2017Updated 9 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- This framework is for fuzzing OSX kernel vulnerability based on passive inline hook mechanism in kernel mode.☆229Oct 18, 2017Updated 8 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- https://github.com/corkami cool :)☆22Mar 13, 2015Updated 11 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- An instruction trace visualisation tool for dynamic program analysis☆370Dec 8, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆176Dec 1, 2022Updated 3 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- Static analysis tools for x86 assembly☆13Mar 3, 2017Updated 9 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- Utility for injecting executable code into a running process on x86/x64 Linux☆268Jul 29, 2016Updated 9 years ago
- Survey of program analysis research with a focus on machine code☆565Sep 8, 2020Updated 5 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago