felipec / xz-minLinks
Minimal setup to trigger the xz backdoor
☆29Updated last year
Alternatives and similar repositories for xz-min
Users that are interested in xz-min are comparing it to the libraries listed below
Sorting:
- iTLB multihit PoC☆42Updated 2 years ago
- Identify and extract files from container formats using unblob.☆25Updated last year
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- A stealthy ELF loader - no files, no execve, no RWX☆171Updated last year
- ☆27Updated 2 years ago
- yxd - Yuu's heX Dumper☆91Updated last year
- The public release of LeftoverLocals code☆70Updated last year
- XZ backdoor reverse engineering☆98Updated last year
- Arbitrary Speculative Code Execution with Return Instructions☆175Updated last year
- ☆24Updated last year
- Low Pin Count (LPC) Analyzer for Saleae Logic☆17Updated last year
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆177Updated this week
- Determine which CPU architecture is used in a binary file.☆125Updated 9 months ago
- Binary Golf Grand Prix☆115Updated 2 years ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆50Updated last year
- Binary Golf Library☆61Updated 4 years ago
- ☆35Updated 10 months ago
- A collection of interesting ELF files for inspiration and testing☆30Updated 2 years ago
- rev.ng configuration for orchestra. The starting point for any development.☆36Updated last month
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆60Updated last year
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆71Updated 9 months ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆86Updated 3 years ago
- Binary Golf Grand Prix☆77Updated 2 weeks ago
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆125Updated this week
- Ghidra scripts for recovering string definitions in Go binaries☆124Updated 2 weeks ago
- ☆117Updated 2 years ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆114Updated 2 years ago
- ugly code to check linux kernel memory and dump some internal structures☆48Updated last year
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆159Updated 3 years ago
- LKRG bypass methods☆73Updated 5 years ago