felipec / xz-minLinks
Minimal setup to trigger the xz backdoor
☆28Updated last year
Alternatives and similar repositories for xz-min
Users that are interested in xz-min are comparing it to the libraries listed below
Sorting:
- iTLB multihit PoC☆42Updated 2 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- ☆27Updated 2 years ago
- A stealthy ELF loader - no files, no execve, no RWX☆170Updated last year
- yxd - Yuu's heX Dumper☆90Updated last year
- Arbitrary Speculative Code Execution with Return Instructions☆172Updated last year
- XZ backdoor reverse engineering☆98Updated last year
- The public release of LeftoverLocals code☆70Updated last year
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆114Updated 2 years ago
- Identify and extract files from container formats using unblob.☆25Updated last year
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆50Updated last year
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆176Updated this week
- Determine which CPU architecture is used in a binary file.☆124Updated 8 months ago
- ☆23Updated last year
- ugly code to check linux kernel memory and dump some internal structures☆48Updated last year
- Ariadne: Binary Ninja Graph Analysis Plugin☆102Updated 9 months ago
- ☆115Updated 2 years ago
- A library for intercepting system calls☆104Updated 10 months ago
- ☆34Updated 9 months ago
- ☆135Updated last year
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆160Updated 3 years ago
- ELEGANTBOUNCER is a detection tool for file-based mobile exploits.☆156Updated 2 months ago
- A collection of interesting ELF files for inspiration and testing☆30Updated 2 years ago
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆123Updated this week
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆59Updated last year
- Binary Golf Library☆61Updated 4 years ago
- ☆112Updated 2 years ago
- A framework for creating smart cards (ICC-based cards with contacts).☆133Updated last year
- ☆23Updated 2 years ago