d3npa / hacking-trix-rust
Small Rust programs that do weird things
☆29Updated 3 years ago
Alternatives and similar repositories for hacking-trix-rust:
Users that are interested in hacking-trix-rust are comparing it to the libraries listed below
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆26Updated 3 years ago
- Binary Golf Library☆62Updated 3 years ago
- ☆48Updated 4 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- NASM Linux x86_64 pure (no deps) shared library (.so), POC for Reflective ELF SO injection☆29Updated last year
- ☆17Updated 4 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- ☆28Updated 2 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 4 years ago
- ☆12Updated 3 years ago
- ☆27Updated 5 years ago
- Longue vue is an exploit chain that can compromise over the internet NETGEAR DGND3700v2 devices.☆25Updated 3 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Another (bad) ROP gadget finder, but this time in Rust☆20Updated last year
- Crystal Anti-Exploit Protection 2012☆37Updated 4 years ago
- ☆16Updated 3 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆64Updated 3 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 3 years ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆82Updated 2 years ago
- A PoC packer written in Rust!☆67Updated 3 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆28Updated last year
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- A rust based DLL injection project☆30Updated 2 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 4 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆47Updated 3 years ago
- Apply YARA rules to your Cutter projects.☆16Updated 5 years ago
- Some simple process injection techniques targeting the Windows platform☆32Updated 5 years ago