elfmaster / scop_virus_paperLinks
ELF Virus infection techniques that work with SCOP (Secure code partitioned) executables
☆15Updated 6 years ago
Alternatives and similar repositories for scop_virus_paper
Users that are interested in scop_virus_paper are comparing it to the libraries listed below
Sorting:
- PoC multi-layer protector for ELF32 x86 binaries☆11Updated 3 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 3 years ago
- An Integrity-Check Monitoring Pintool☆57Updated 4 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- ☆28Updated 5 years ago
- PANDA-powered tracing engine for tenet☆11Updated 3 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆110Updated 5 years ago
- Naive Proof of Concept Crypter for GNU/Linux ELF64☆11Updated 7 years ago
- ☆18Updated 6 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- ☆18Updated 3 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Updated 3 years ago
- Sample Binary Ninja Plugin☆22Updated last year
- LKRG bypass methods☆72Updated 5 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- ☆21Updated 6 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 4 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆32Updated last year
- Course sample for SMT-Based Binary Program Analysis training class☆30Updated 7 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆37Updated 5 years ago
- Automatically exported from code.google.com/p/narly☆24Updated 3 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆46Updated 5 years ago
- My notes about Genyatyk VM crackme☆26Updated 4 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆38Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Headless Scripts for Ghidra's Headless Analyzer written in Python☆32Updated 5 years ago