Educational virus written in Assembly that infects 32-bit ELF executables on Linux using the data segment infection method
☆79Dec 26, 2016Updated 9 years ago
Alternatives and similar repositories for cranky-data-virus
Users that are interested in cranky-data-virus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- sample linux x86_64 ELF virus☆54Jun 25, 2018Updated 7 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Nov 2, 2013Updated 12 years ago
- ELF binary infector☆33May 25, 2011Updated 14 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A console for assemble/disassemble code using capstone/keystone☆32May 14, 2018Updated 7 years ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50May 12, 2022Updated 3 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- STAN is a sTAtic aNalyser☆39Jul 26, 2017Updated 8 years ago
- Tools and library to manipulate EFI variables.☆10Mar 26, 2026Updated 2 weeks ago
- ☆14Aug 12, 2015Updated 10 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Jun 27, 2018Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Devestating and awesome Linux X86_64 ELF Virus☆239Sep 9, 2022Updated 3 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 8 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆30Sep 10, 2020Updated 5 years ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- ☆45Jun 16, 2017Updated 8 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Mar 21, 2023Updated 3 years ago
- Bootkits Revisited☆39Jun 3, 2014Updated 11 years ago
- Client of Richkware-Manager-Server, that obtains list of all hosts and is able to send commands to do at each of them.☆13Dec 28, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Google maps http and ip lookup for ida pro☆14Mar 10, 2019Updated 7 years ago
- Random experiments in C☆15Sep 30, 2020Updated 5 years ago
- Linux assembly programs☆18Mar 24, 2026Updated 2 weeks ago
- Processes and metrics for assessing obfuscation effectiveness☆55Jan 26, 2017Updated 9 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Dec 18, 2023Updated 2 years ago
- fun rootkits stuff!☆20Jul 28, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- Gozi-MBR-rootkit Bootkit Modified☆69Oct 25, 2016Updated 9 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆58Dec 25, 2021Updated 4 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year