b-2-r / practical-binary-analysis
A collection of solutions and other inspiring material to Dennis Andriesse's 'Practical Binary Analysis' book.
☆33Updated 3 years ago
Alternatives and similar repositories for practical-binary-analysis:
Users that are interested in practical-binary-analysis are comparing it to the libraries listed below
- My own versions from the programs of the book "Practical Binary Analysis"☆52Updated 5 years ago
- Learning Linux Binary Analysis, published by Packt☆81Updated 2 years ago
- As I work thought the book "Practical Binary Analysis" by Dennis Andriesse, https://practicalbinaryanalysis.com/ I try to make editions f…☆11Updated 3 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆42Updated 3 years ago
- Old and new CTFs about Linux kernel exploitation.☆52Updated 2 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆74Updated 3 months ago
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆31Updated last year
- Helper script for Linux kernel disassemble or debugging with IDA Pro on VMware + GDB stub (including some symbols helpers)☆36Updated last year
- Shiva is a programmable dynamic linker for loading ELF microprograms☆28Updated last year
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Updated 3 years ago
- Code samples from Practical Binary Analysis☆22Updated 4 years ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆45Updated 2 months ago
- ugly code to check linux kernel memory and dump some internal structures☆43Updated last month
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆61Updated 2 years ago
- ☆101Updated 3 months ago
- A collection of Linux kernel rootkits found across the internet taken and put together☆74Updated 2 years ago
- ELF static analysis and injection framework that parse, manipulate, patch and camouflage ELF files.☆57Updated this week
- Build your emulation environment as needed☆64Updated 3 years ago
- Example files to experience basic exploit techniques.☆73Updated 5 years ago
- Fast, parallel, cross-variant ROP/JOP gadget search for x86/x64 binaries.☆86Updated last year
- -x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x- LD_PRELOAD based user-land rootkit for Linux platform.☆27Updated 4 years ago
- harness for fuzzing with winafl. both public and my own which i have released.☆53Updated 3 years ago
- "Pwntools does not support Windows. Use a real OS ;)" — Zach Riggle, 2015☆82Updated 5 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆69Updated last year
- The best vulnerable driver to learn how to exploit kernel vulnerability.☆28Updated 5 years ago
- A Linux kernel module which hides itself☆41Updated 3 years ago
- Curated collection of resources, examples and scripts for Linux kernel devs, researchers and hobbyists.☆54Updated 2 years ago
- Recover 64 bit ELF executables from memory dump☆84Updated 6 years ago
- Udemy – Linux Heap Exploitation☆35Updated 3 years ago
- A small kernel module that can hook arbitrary syscalls on x86_64☆49Updated 5 years ago