f0wl / ezuri_unpack
Simple unpacking script for Ezuri ELF Crypter
☆33Updated 3 years ago
Alternatives and similar repositories for ezuri_unpack:
Users that are interested in ezuri_unpack are comparing it to the libraries listed below
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆26Updated 3 years ago
- ☆27Updated 5 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆11Updated 3 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆47Updated 3 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Updated 4 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Rootkit spotter - experimental Linux rootkit finder LKM☆28Updated 4 years ago
- Shellcode process injector☆27Updated 4 years ago
- ☆16Updated 5 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- My attempt at writing exploit POCs for various CVEs☆16Updated 5 years ago
- Code snippets for Qiling Tutorials☆20Updated 4 years ago
- Basic multi platform meterpreter loader module.☆15Updated 4 years ago
- Non organized Cpp code files I used for my research on Windows☆22Updated 4 years ago
- Reverse Windows shell over TLS☆18Updated 9 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- A collection of shellcode hashes☆17Updated 6 years ago
- Script(s) to assist with the setup of WinDBG & mona.py on a Windows 10 VM☆26Updated 2 years ago
- ☆36Updated 5 years ago
- ☆20Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- ☆22Updated 4 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 7 years ago