elfmaster / sherlocked
Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.
☆104Updated 10 years ago
Alternatives and similar repositories for sherlocked:
Users that are interested in sherlocked are comparing it to the libraries listed below
- Certified Edible Dinosaurs official CTF toolkit☆120Updated 6 years ago
- ☆137Updated 6 years ago
- A CrackMe powered with a virtual machine.☆44Updated 9 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- C++-based shellcode builder☆112Updated 4 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆73Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 10 years ago
- Linux local root exploit for CVE-2014-0038☆192Updated 10 years ago
- a linux process hacker tool☆83Updated 5 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆60Updated 9 years ago
- ☆137Updated 3 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆130Updated 6 years ago
- Small tool for disassembling shellcode (using objdump)☆146Updated 2 years ago
- ☆38Updated 9 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- Broadpwn bug (CVE-2017-9417)☆50Updated 7 years ago
- PoC for CVE-2015-6086☆68Updated 8 years ago
- Network and USB protocol fuzzing toolkit.☆35Updated 7 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆284Updated 8 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆56Updated 8 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆114Updated 4 years ago
- Stealth's 64bit injectso port☆74Updated 14 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆38Updated 7 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- A Python library and tools providing easy access to the retdec.com decompilation service through their REST API.☆93Updated 6 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- windows kernel vulnerability found by me☆91Updated 7 years ago