echel0nn / having-fun-with-qiling
qiling framework examples
☆16Updated 3 years ago
Alternatives and similar repositories for having-fun-with-qiling:
Users that are interested in having-fun-with-qiling are comparing it to the libraries listed below
- This repo contain Android malware samples and analysis☆13Updated 4 years ago
- ☆27Updated 4 years ago
- ☆28Updated 4 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Our team's CTF writeups☆10Updated 5 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆31Updated 4 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Updated 7 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆14Updated 3 years ago
- Code snippets for Qiling Tutorials☆20Updated 4 years ago
- ☆18Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Malware vulnerability research. Coming soon..☆12Updated 4 years ago
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago
- ☆77Updated last month
- My notes about Genyatyk VM crackme☆26Updated 4 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- HN Security's advisories.☆22Updated 5 months ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆15Updated 4 years ago
- A library for patching ELFs☆54Updated 4 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- ☆13Updated 4 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated last year
- My conference presentations and Materials for them.☆32Updated 2 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- The Dumb Network Fuzzer☆20Updated last year
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆73Updated 4 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 5 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 2 years ago
- ☆11Updated 4 years ago
- #INFILTRATE20 raptor's party pack.☆28Updated last year