cranklin / cranky-data-virus
Educational virus written in Assembly that infects 32-bit ELF executables on Linux using the data segment infection method
☆78Updated 8 years ago
Alternatives and similar repositories for cranky-data-virus:
Users that are interested in cranky-data-virus are comparing it to the libraries listed below
- NASM Standard Library for shellcode☆69Updated 8 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- Diary of a reverse-engineer☆38Updated 7 years ago
- An ELF parsing and manipulation library for Python☆74Updated 10 years ago
- ☆137Updated 3 years ago
- A program that automatically generates AFL-enabled builds of Debian packages.☆92Updated 5 years ago
- Certified Edible Dinosaurs official CTF toolkit☆120Updated 6 years ago
- Some kernel exploits☆144Updated 7 years ago
- sample linux x86_64 ELF virus☆53Updated 6 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆97Updated 8 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆163Updated 8 years ago
- Binary Ninja Function Annotator☆40Updated 6 years ago
- SIGSTOPing ELF binaries since 0x7E1☆52Updated 7 months ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago
- ELF Infector's Toolkit☆64Updated 8 years ago
- Advanced buffer overflow and memory corruption security challenges☆188Updated 3 years ago
- An open source, multi-architecture ROP compiler written in python☆161Updated 7 years ago
- Cross Architecture Shellcode in C☆200Updated 8 years ago
- ☆89Updated 6 months ago
- Slides, Papers, Links to CVEs and advisories☆78Updated 7 years ago
- Linux bind shell with anti-reverse engineering techniques☆285Updated 8 years ago
- Slides and very basic examples☆111Updated 7 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆38Updated 7 years ago
- A simple MBR hijack demonstration☆179Updated 2 years ago
- Stealth's 64bit injectso port☆74Updated 14 years ago
- Small tool for generating ropchains using unicorn and z3☆197Updated 7 years ago
- Radare 2 wiki☆91Updated 4 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆55Updated 9 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 8 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago