cenobyte-vincit / encrypted-linux-kernel-modulesLinks
encrypted-linux-kernel-modules
☆12Updated 4 years ago
Alternatives and similar repositories for encrypted-linux-kernel-modules
Users that are interested in encrypted-linux-kernel-modules are comparing it to the libraries listed below
Sorting:
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- ☆27Updated 5 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 3 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆11Updated 3 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- 🔓 x86 Linux Kernel rootkit for Debian 9 (4.9.0-11-686-pae)☆34Updated 5 years ago
- Skeleton project for your own GRUB-based bootkit☆16Updated 5 years ago
- Configure SPI flash write protection.☆24Updated 5 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 3 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- A Python IDA Plugin that finds a route from one function to another.☆12Updated 6 years ago
- Tool for working with memory of a running Linux process☆12Updated 4 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- ☆36Updated 5 years ago
- My conference presentations and publications☆26Updated 3 years ago
- Format string exploit generation☆10Updated 9 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- Simulate afl-fuzz☆16Updated 5 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆47Updated 3 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- Rootkit Detector for UNIX☆61Updated last year