antire-book / dont_panicView external linksLinks
Linux bind shell with anti-reverse engineering techniques
☆291Feb 9, 2017Updated 9 years ago
Alternatives and similar repositories for dont_panic
Users that are interested in dont_panic are comparing it to the libraries listed below
Sorting:
- Example code from "Programming Linux Anti-Reversing Techniques"☆100Feb 9, 2017Updated 9 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- add symbols back into a stripped ELF binary (~strip)☆177Aug 8, 2017Updated 8 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Feb 9, 2018Updated 8 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆287May 24, 2016Updated 9 years ago
- HORSEPILL rootkit PoC☆233Aug 5, 2016Updated 9 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 7 years ago
- Automated Exploit generation with WinDBG☆190Oct 18, 2016Updated 9 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- Cross Architecture Shellcode in C☆208Aug 24, 2016Updated 9 years ago
- binary patching from Python☆639Jul 6, 2023Updated 2 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆971Dec 11, 2020Updated 5 years ago
- Unofficial American Fuzzy Lop repo☆25Aug 5, 2016Updated 9 years ago
- Various snippets created during malware analysis☆465Oct 3, 2025Updated 4 months ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆240Nov 19, 2025Updated 2 months ago
- This project has been moved to:☆1,462Apr 7, 2021Updated 4 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆414Jan 2, 2020Updated 6 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆177Dec 1, 2022Updated 3 years ago
- An instruction trace visualisation tool for dynamic program analysis☆370Dec 8, 2022Updated 3 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆160Jul 4, 2016Updated 9 years ago
- Utility for injecting executable code into a running process on x86/x64 Linux☆269Jul 29, 2016Updated 9 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆265Jul 6, 2017Updated 8 years ago
- Local UNIX PrivEsc Aggregation☆244Apr 9, 2016Updated 9 years ago
- inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extr…☆294Sep 30, 2023Updated 2 years ago
- Tools for reverse engineering the Utimaco Firmware☆44Jan 24, 2017Updated 9 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Jul 22, 2016Updated 9 years ago
- Exploit the credentials present in files and memory☆845May 25, 2023Updated 2 years ago
- This framework is for fuzzing OSX kernel vulnerability based on passive inline hook mechanism in kernel mode.☆229Oct 18, 2017Updated 8 years ago
- An evolutionary knowledge-based fuzzer☆272May 5, 2024Updated last year
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Oct 22, 2016Updated 9 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆998Feb 10, 2019Updated 7 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆232Jan 18, 2024Updated 2 years ago