dgl / vt-houdiniLinks
☆46Updated 3 months ago
Alternatives and similar repositories for vt-houdini
Users that are interested in vt-houdini are comparing it to the libraries listed below
Sorting:
- CLI tools: encoders/decoders, CTF and reverse engineering helpers.☆137Updated 3 weeks ago
- Simple syscall sandboxing for Linux☆138Updated 3 weeks ago
- Binary Protocol Differ☆118Updated 5 years ago
- proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX☆35Updated 4 months ago
- yxd - Yuu's heX Dumper☆90Updated last year
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated last year
- ☆23Updated 11 months ago
- Determine Who Can Log In to an SSH Server☆29Updated 2 months ago
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't ca…☆202Updated 2 years ago
- A stealthy ELF loader - no files, no execve, no RWX☆169Updated last year
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆28Updated last year
- ☆35Updated last year
- A multi-arch assembly REPL and emulator for your command line.☆308Updated 9 months ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆75Updated 2 weeks ago
- ELEGANTBOUNCER is a detection tool for file-based mobile exploits.☆138Updated this week
- random dissectors☆67Updated 2 years ago
- Intercept stdin/stdout/stderr for any process☆198Updated 2 years ago
- ☆24Updated last year
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆193Updated last year
- Utility to find hidden Linux kernel modules☆144Updated last month
- Diff and display virtual machine snapshots☆245Updated 2 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- XZ backdoor reverse engineering☆98Updated last year
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆32Updated 2 years ago
- Fast syncronization across networks using speedy compression, lots of parallelization and fast hashmaps for keeping track of things inter…☆96Updated last year
- Linux netfilter module to toggle evil bit (RFC 3514) in all outgoing IPv4 packets☆28Updated 7 years ago
- io_uring based rootkit☆232Updated 4 months ago
- Minimal setup to trigger the xz backdoor☆28Updated 10 months ago
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆52Updated 2 weeks ago
- Detect if your container is running under a hypervisor☆200Updated 10 years ago