emirkmo / xz-backdoor-github
History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.
☆9Updated last year
Alternatives and similar repositories for xz-backdoor-github:
Users that are interested in xz-backdoor-github are comparing it to the libraries listed below
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- ☆37Updated 4 years ago
- Corewars but within r2☆58Updated 10 months ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 7 years ago
- proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX☆34Updated 3 weeks ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- Scapy hands-on☆34Updated last year
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Files used for various testing methodologies.☆13Updated 8 years ago
- ☆20Updated 3 years ago
- DEbian Cve REproducer Tool☆23Updated last year
- Data graphing library for command line.☆15Updated 3 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- Secure File Transfer via Global Socket Bounce Network☆24Updated 4 years ago
- CLI tool and Ghidra plug-in for analyzing binaries using under-constrained symbolic execution☆106Updated this week
- assembly language examples, mostly Linux☆45Updated 4 years ago
- LKRG bypass methods☆72Updated 5 years ago
- Content related to hardware hacking☆51Updated 6 years ago
- Trail of Bits Testing Handbook☆72Updated 2 weeks ago
- render sprites into your desktop environment as shaped windows using GTK☆20Updated 3 years ago
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Updated 3 years ago
- ☆44Updated last month
- Minimal setup to trigger the xz backdoor☆27Updated 6 months ago
- Binary Golf Grand Prix☆111Updated last year
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆92Updated last year
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- ☆26Updated 2 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- Utility to find hidden Linux kernel modules☆144Updated 4 months ago
- Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analy…☆13Updated 4 years ago