elfmaster / scop_virus_paper
ELF Virus infection techniques that work with SCOP (Secure code partitioned) executables
☆15Updated 5 years ago
Alternatives and similar repositories for scop_virus_paper:
Users that are interested in scop_virus_paper are comparing it to the libraries listed below
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆25Updated 3 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆109Updated 4 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 4 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆62Updated 3 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆10Updated 3 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- Sample Binary Ninja Plugin☆21Updated last year
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆27Updated 4 years ago
- ☆18Updated 3 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆46Updated 5 years ago
- An Integrity-Check Monitoring Pintool☆56Updated 4 years ago
- A monitoring script for AFL☆39Updated 8 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 4 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 6 years ago
- gopclntab finder and analyzer for Radare2☆19Updated 4 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Crackme challenge☆17Updated 4 years ago
- My notes about Genyatyk VM crackme☆26Updated 4 years ago
- ☆48Updated 4 years ago
- iTLB multihit PoC☆40Updated last year
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆22Updated 2 years ago
- ☆11Updated 5 months ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆116Updated 8 years ago
- LKRG bypass methods☆71Updated 5 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 4 years ago
- ☆47Updated 2 years ago
- Breaking Secure Boot with SMM☆40Updated 2 years ago