cranklin / cranky-data-virus
Educational virus written in Assembly that infects 32-bit ELF executables on Linux using the data segment infection method
☆78Updated 8 years ago
Alternatives and similar repositories for cranky-data-virus:
Users that are interested in cranky-data-virus are comparing it to the libraries listed below
- NASM Standard Library for shellcode☆69Updated 8 years ago
- This repository contains a docker container dedicated to reverse engineering☆84Updated 6 years ago
- Copy of the contents at phrack.com☆38Updated 2 weeks ago
- Advanced buffer overflow and memory corruption security challenges☆188Updated 3 years ago
- sample linux x86_64 ELF virus☆53Updated 6 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- Some kernel exploits☆144Updated 7 years ago
- ☆137Updated 3 years ago
- Linux bind shell with anti-reverse engineering techniques☆285Updated 8 years ago
- Supplement to radare2-explorations.☆33Updated 8 years ago
- Implementation of the SMM rootkit "The Watcher"☆124Updated 3 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆87Updated last year
- GATEKEEPER: Inline and on-target defense☆119Updated 2 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆73Updated 8 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- ELF Infector's Toolkit☆64Updated 8 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- Linux Runtime Process Injection Tool☆58Updated 12 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 8 years ago
- Linux rootkit and detection examples☆32Updated 9 years ago
- Radare 2 wiki☆91Updated 4 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆25Updated 9 years ago
- linux rootkit☆159Updated 7 years ago
- shellcoderhandbook source code : "The Shellcoder's Handbook: Discovering and Exploiting Security Holes"☆73Updated 11 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 9 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆97Updated 8 years ago
- STAN is a sTAtic aNalyser☆39Updated 7 years ago
- A linux rootkit works on kernel 4.0.X or higher☆36Updated 8 years ago