cranklin / cranky-data-virusLinks
Educational virus written in Assembly that infects 32-bit ELF executables on Linux using the data segment infection method
☆79Updated 8 years ago
Alternatives and similar repositories for cranky-data-virus
Users that are interested in cranky-data-virus are comparing it to the libraries listed below
Sorting:
- A simple MBR hijack demonstration☆181Updated 2 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 8 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆97Updated 8 years ago
- NASM Standard Library for shellcode☆69Updated 8 years ago
- This repository contains a docker container dedicated to reverse engineering☆85Updated 6 years ago
- Clone of hidden tear written in C++☆69Updated 4 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- sample linux x86_64 ELF virus☆53Updated 7 years ago
- Diary of a reverse-engineer☆39Updated 7 years ago
- Library for Dissect and Infect ELF Binaries.☆40Updated 2 months ago
- Copy of the contents at phrack.com☆39Updated 3 months ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆104Updated 10 years ago
- Advanced buffer overflow and memory corruption security challenges☆189Updated 3 years ago
- Cross Platform Malware Development Framework☆68Updated 9 years ago
- Certified Edible Dinosaurs official CTF toolkit☆121Updated 7 years ago
- Linux Runtime Process Injection Tool☆61Updated 12 years ago
- Blogging about reversing "script kiddie" style malware.☆98Updated 10 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 9 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆99Updated 8 years ago
- ASM Malicious code - PE infector☆71Updated 8 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- Devestating and awesome Linux X86_64 ELF Virus☆230Updated 2 years ago
- Linux rootkit and detection examples☆32Updated 9 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- Radare 2 wiki☆93Updated 5 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- A linux rootkit works on kernel 4.0.X or higher☆37Updated 9 years ago
- ☆138Updated 3 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago