felipec / xz-min
Minimal setup to trigger the xz backdoor
☆27Updated 6 months ago
Alternatives and similar repositories for xz-min:
Users that are interested in xz-min are comparing it to the libraries listed below
- ☆26Updated 2 years ago
- iTLB multihit PoC☆40Updated last year
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated 10 months ago
- Shiva is a programmable dynamic linker for loading ELF microprograms☆32Updated last year
- libLISA: Instruction Discovery and Analysis on x86-64☆112Updated 2 months ago
- sandbox demo☆11Updated last year
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆32Updated last year
- Binary Ninja plugin for the Avnera AV6xxx/AV7xxx architecture☆28Updated last month
- ugly code to check linux kernel memory and dump some internal structures☆46Updated 5 months ago
- XZ backdoor reverse engineering☆94Updated 9 months ago
- Low Pin Count (LPC) Analyzer for Saleae Logic☆17Updated last year
- simple type recognition in decompiled executables☆109Updated 10 months ago
- A collection of interesting ELF files for inspiration and testing☆27Updated 2 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- ☆61Updated 2 months ago
- proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX☆35Updated 2 weeks ago
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆53Updated last month
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆46Updated 3 months ago
- Arbitrary Speculative Code Execution with Return Instructions☆160Updated last year
- LKRG bypass methods☆72Updated 5 years ago
- Overview of Secure-Launch process on Qualcomm devices☆58Updated last year
- rev.ng configuration for orchestra. The starting point for any development.☆36Updated this week
- CLI tool and Ghidra plug-in for analyzing binaries using under-constrained symbolic execution☆108Updated this week
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆85Updated 2 years ago
- A step towards automating the creation of Ghidra processor modules☆37Updated 3 weeks ago
- Binja loader for AMD-SP or PSP firmware binaries.☆36Updated 2 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- ☆113Updated last year
- ☆24Updated last year
- A tool to perform so called BGE attack☆24Updated last year