d3npa / hacking-trix-rustLinks
Small Rust programs that do weird things
☆30Updated 3 years ago
Alternatives and similar repositories for hacking-trix-rust
Users that are interested in hacking-trix-rust are comparing it to the libraries listed below
Sorting:
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 3 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Updated 3 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Binary Golf Library☆61Updated 4 years ago
- Another (bad) ROP gadget finder, but this time in Rust☆22Updated last year
- ☆18Updated 5 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- ☆48Updated 5 years ago
- Apply YARA rules to your Cutter projects.☆16Updated 5 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated 2 months ago
- Matryoshka - stacked LKM loader☆52Updated last year
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆85Updated 2 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆47Updated 3 years ago
- GPU rootkit PoC by Team Jellyfish☆99Updated 10 years ago
- NASM Linux x86_64 pure (no deps) shared library (.so), POC for Reflective ELF SO injection☆30Updated last year
- ☆28Updated 3 years ago
- "Reversing WebAssembly Module 101" Workshop (NorthSec 2019, hack.lu 2019)☆20Updated 4 years ago
- ☆28Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- ☆12Updated 3 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- ☆18Updated 4 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 5 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆117Updated 8 months ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- Some simple process injection techniques targeting the Windows platform☆31Updated 5 years ago
- ☆81Updated 2 months ago