elfmaster / scop_virus_paperLinks
ELF Virus infection techniques that work with SCOP (Secure code partitioned) executables
☆15Updated 6 years ago
Alternatives and similar repositories for scop_virus_paper
Users that are interested in scop_virus_paper are comparing it to the libraries listed below
Sorting:
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 3 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Updated 3 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆110Updated 5 years ago
- ☆48Updated 5 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- Just a modern packer for elf binaries ( works on linux executables only )☆42Updated 4 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆11Updated 3 years ago
- LKRG bypass methods☆72Updated 5 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆47Updated 3 years ago
- ☆18Updated 5 years ago
- Virtual machine introspection library based on libvmi - parts of this work have been funded by Deutsche Forschungsgemeinschaft (DFG) – pr…☆29Updated 3 years ago
- Another (bad) ROP gadget finder, but this time in Rust☆21Updated last year
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆85Updated 2 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- Matryoshka - stacked LKM loader☆52Updated last year
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- A system call interception tool☆57Updated 7 months ago
- Sample Binary Ninja Plugin☆22Updated 2 years ago
- Apply YARA rules to your Cutter projects.☆16Updated 5 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- An Integrity-Check Monitoring Pintool☆58Updated 4 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- gopclntab finder and analyzer for Radare2☆20Updated 4 years ago
- Changing memory protection in an arbitrary process☆47Updated 6 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago