elfmaster / scop_virus_paper
ELF Virus infection techniques that work with SCOP (Secure code partitioned) executables
☆14Updated 5 years ago
Alternatives and similar repositories for scop_virus_paper:
Users that are interested in scop_virus_paper are comparing it to the libraries listed below
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆25Updated 3 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 4 years ago
- Sample Binary Ninja Plugin☆20Updated last year
- x86 bootloader emulation with Miasm (case of NotPetya)☆40Updated 5 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 4 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆62Updated 2 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆46Updated 5 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆10Updated 2 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 4 years ago
- Breaking Secure Boot with SMM☆40Updated 2 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 4 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 9 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆109Updated 4 years ago
- ☆12Updated 3 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- ☆46Updated 2 years ago
- ☆33Updated 3 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 3 years ago
- Repository for Flare-On challenges and solutions/code☆9Updated 2 months ago
- ☆47Updated 2 years ago
- An Integrity-Check Monitoring Pintool☆56Updated 4 years ago
- Investigating the bug behind CVE-2021-26708☆27Updated 4 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Updated 2 years ago
- Code injection from Linux kernel to a process☆19Updated last year
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆22Updated 2 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆27Updated 4 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- ☆9Updated 4 months ago