cybertechniques / example-techniques-obfuscation-packing-upxLinks
☆30Updated 9 years ago
Alternatives and similar repositories for example-techniques-obfuscation-packing-upx
Users that are interested in example-techniques-obfuscation-packing-upx are comparing it to the libraries listed below
Sorting:
- Simple Polymorphic x86_64 Runtime Code Segment Cryptor☆58Updated 7 years ago
- A tool pulls loaded binaries ordered by memory regions☆34Updated 6 years ago
- Fighting String Encryption in Android Malware☆58Updated 3 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆40Updated 5 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- Simple ELF crypter. Uses RC4 encryption.☆122Updated 5 years ago
- The PoC implementations for the Android code packing technique.☆12Updated 9 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆111Updated 5 years ago
- ELF packer for i386☆32Updated 9 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- A smali emulator.☆25Updated 7 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆11Updated 3 years ago
- [Digital Whisper] Reverse Engineering Automation Article - Source Codes☆69Updated 2 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆55Updated 3 years ago
- pyGoRE - Python library for analyzing Go binaries☆65Updated 3 years ago
- Scripts I made to aid me in everyday reversing or just for fun...☆35Updated 6 years ago
- Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.☆81Updated 4 years ago
- memdump allows you to dump processes memory at any given time and view its contents. Most programs store critical information in memory t…☆18Updated 12 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆30Updated 5 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆111Updated 5 years ago
- A basic android pentest environment to instrument apps without root or repackaging an app☆65Updated 5 years ago
- Log data to/from SSL_write/SSL_read to disk using LD_PRELOAD hooks☆93Updated 5 years ago
- IDA Pro resources, scripts, and configurations☆119Updated last month
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 8 years ago
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Updated 2 years ago
- x86_64 linux rootkit using debug registers☆53Updated 3 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 4 years ago
- Encrypts 64-bit elf files that decrypt at runtime.☆33Updated 7 months ago
- Android Malware Tracker☆29Updated last year
- A windbg extension for ASLR/DEP/SafeSEH check☆27Updated 7 years ago