cranklin / cranky-data-virusView external linksLinks
Educational virus written in Assembly that infects 32-bit ELF executables on Linux using the data segment infection method
☆79Dec 26, 2016Updated 9 years ago
Alternatives and similar repositories for cranky-data-virus
Users that are interested in cranky-data-virus are comparing it to the libraries listed below
Sorting:
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 5 years ago
- sample linux x86_64 ELF virus☆54Jun 25, 2018Updated 7 years ago
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- STAN is a sTAtic aNalyser☆38Jul 26, 2017Updated 8 years ago
- OverTheWire Wargames write-ups☆24Jun 13, 2017Updated 8 years ago
- A console for assemble/disassemble code using capstone/keystone☆32May 14, 2018Updated 7 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆156Apr 7, 2023Updated 2 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Nov 2, 2013Updated 12 years ago
- Devestating and awesome Linux X86_64 ELF Virus☆235Sep 9, 2022Updated 3 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆30Sep 10, 2020Updated 5 years ago
- A rootkit for linux kernel >= 3.0☆19May 18, 2014Updated 11 years ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- This is the gandcrab v5.0.3 javascript dropper☆10Apr 29, 2020Updated 5 years ago
- Google maps http and ip lookup for ida pro☆14Mar 10, 2019Updated 6 years ago
- fun rootkits stuff!☆20Jul 28, 2015Updated 10 years ago
- ☆45Jun 16, 2017Updated 8 years ago
- Come on a tool to decode "MD5" + "Sha1" + "Sha256" even if it is very difficult☆13Oct 9, 2022Updated 3 years ago
- Linux assembly programs☆17Updated this week
- Tools and library to manipulate EFI variables.☆10Jan 16, 2026Updated last month
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Feb 9, 2018Updated 8 years ago
- Random experiments in C☆15Sep 30, 2020Updated 5 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- ☆15Nov 29, 2017Updated 8 years ago
- ELF binary infector☆33May 25, 2011Updated 14 years ago
- Custom THP Dropper☆26Mar 27, 2018Updated 7 years ago
- The Horrific Omnipotent Rootkit☆23Mar 17, 2017Updated 8 years ago
- 2 Linux Kernel Modules for Listing Tasks. The first iterates over the tasks linearly and the second iterates over the tasks with a depth-…☆14Jun 27, 2021Updated 4 years ago
- Linux backdoor using ICMP payload for activation☆11Nov 18, 2014Updated 11 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Oct 10, 2015Updated 10 years ago
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- Windows Malware☆39Apr 17, 2013Updated 12 years ago