dimkr / elfenceLinks
An overlay that verifies signed ELF binaries
☆9Updated 10 years ago
Alternatives and similar repositories for elfence
Users that are interested in elfence are comparing it to the libraries listed below
Sorting:
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Updated 9 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- sign elf binaries with GPG☆18Updated 8 years ago
- Alternative hexdump.☆15Updated 9 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- superstrip - strip an ELF executable of all unmapped information - David Madore / Laurent Bercot☆12Updated 8 years ago
- A tiny tool to learn the assembly code☆11Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- Several example uses of TPM2/TSS APIs.☆10Updated 9 years ago
- A deceptively simple way to add a configuration file to a command-line application.☆16Updated 2 months ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 6 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- Tools for testing C compilers for the correct handling of volatile objects.☆26Updated 10 years ago
- Load a .so from network and execute it inside a seccomp sandbox☆19Updated 9 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Updated 9 years ago
- ☆36Updated 12 years ago
- A graphical multiplatform tool to manipulate and forward TCP connections.☆12Updated 13 years ago
- A framework for analyzing/testing/fuzzing network applications.☆46Updated 6 years ago
- Heap analysis tooling for mempool☆13Updated 2 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- Fuzzing compression libraries☆19Updated 9 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆15Updated 8 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 10 years ago
- Dump sections or program entries from a ELF file☆22Updated 9 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆20Updated 15 years ago
- some core unix utils with focus on simplicity and ability to build standalone.☆40Updated last year
- A frighteningly-easy way of denying access to someone's publicly-accessible OpenSSH server in a default configuration. Originally writte…☆28Updated 11 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago