cranklin / cranky-data-virusLinks
Educational virus written in Assembly that infects 32-bit ELF executables on Linux using the data segment infection method
☆79Updated 8 years ago
Alternatives and similar repositories for cranky-data-virus
Users that are interested in cranky-data-virus are comparing it to the libraries listed below
Sorting:
- NASM Standard Library for shellcode☆69Updated 9 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago
- A simple MBR hijack demonstration☆181Updated 2 years ago
- ☆71Updated 6 years ago
- ☆24Updated 9 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- sample linux x86_64 ELF virus☆53Updated 7 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆90Updated last year
- ☆89Updated last year
- Advanced buffer overflow and memory corruption security challenges☆189Updated 3 years ago
- Devestating and awesome Linux X86_64 ELF Virus☆232Updated 2 years ago
- STAN is a sTAtic aNalyser☆39Updated 8 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆164Updated 8 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- ☆25Updated 6 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆97Updated 8 years ago
- Diary of a reverse-engineer☆39Updated 7 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆43Updated 10 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Updated 9 years ago
- ☆139Updated 3 years ago
- Certified Edible Dinosaurs official CTF toolkit☆121Updated 7 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 10 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆50Updated 7 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- ☆15Updated 7 years ago
- ☆49Updated 7 years ago
- A linux rootkit works on kernel 4.0.X or higher☆37Updated 9 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 9 years ago
- Cross Platform Malware Development Framework☆68Updated 9 years ago