Educational virus written in Assembly that infects 32-bit ELF executables on Linux using the data segment infection method
☆79Dec 26, 2016Updated 9 years ago
Alternatives and similar repositories for cranky-data-virus
Users that are interested in cranky-data-virus are comparing it to the libraries listed below
Sorting:
- sample linux x86_64 ELF virus☆54Jun 25, 2018Updated 7 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Nov 2, 2013Updated 12 years ago
- ELF binary infector☆33May 25, 2011Updated 14 years ago
- A console for assemble/disassemble code using capstone/keystone☆32May 14, 2018Updated 7 years ago
- OverTheWire Wargames write-ups☆25Jun 13, 2017Updated 8 years ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- ELF Infector's Toolkit☆64May 26, 2016Updated 9 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- STAN is a sTAtic aNalyser☆39Jul 26, 2017Updated 8 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆156Apr 7, 2023Updated 2 years ago
- Tools and library to manipulate EFI variables.☆10Mar 13, 2026Updated last week
- ☆14Aug 12, 2015Updated 10 years ago
- Embed IPython to rescue your code.☆10Jul 11, 2025Updated 8 months ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Jun 27, 2018Updated 7 years ago
- Devestating and awesome Linux X86_64 ELF Virus☆238Sep 9, 2022Updated 3 years ago
- A rootkit for linux kernel >= 3.0☆19May 18, 2014Updated 11 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆30Sep 10, 2020Updated 5 years ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- ☆45Jun 16, 2017Updated 8 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Mar 21, 2023Updated 3 years ago
- Bootkits Revisited☆39Jun 3, 2014Updated 11 years ago
- Client of Richkware-Manager-Server, that obtains list of all hosts and is able to send commands to do at each of them.☆13Dec 28, 2025Updated 2 months ago
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Google maps http and ip lookup for ida pro☆14Mar 10, 2019Updated 7 years ago
- Random experiments in C☆15Sep 30, 2020Updated 5 years ago
- Linux assembly programs☆18Updated this week
- Processes and metrics for assessing obfuscation effectiveness☆55Jan 26, 2017Updated 9 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Dec 18, 2023Updated 2 years ago
- fun rootkits stuff!☆20Jul 28, 2015Updated 10 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- Gozi-MBR-rootkit Bootkit Modified☆69Oct 25, 2016Updated 9 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago