hamarituc / xz-backdoorLinks
☆35Updated last year
Alternatives and similar repositories for xz-backdoor
Users that are interested in xz-backdoor are comparing it to the libraries listed below
Sorting:
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆59Updated last year
- XZ backdoor reverse engineering☆98Updated last year
- A library for intercepting system calls☆104Updated 10 months ago
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆68Updated 8 months ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- iTLB multihit PoC☆42Updated 2 years ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆86Updated 3 years ago
- ☆12Updated 3 years ago
- A tasty cross-platform tool from Blacksea to debug shellcode!☆92Updated 2 years ago
- Utility to find hidden Linux kernel modules☆146Updated 4 months ago
- A stealthy ELF loader - no files, no execve, no RWX☆170Updated last year
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Ghidra scripts for recovering string definitions in Go binaries☆122Updated last year
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆28Updated last year
- Native Rust bindings for @horsicq's Detect-It-Easy☆17Updated last week
- ☆79Updated 11 months ago
- ☆90Updated 9 months ago
- Attack tool for altering packed samples so that they evade static packing detection☆21Updated 9 months ago
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆31Updated 11 months ago
- ☆135Updated last year
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆85Updated last year
- Python3 scripts that executes an elf (Linux executable format) completely in memory.☆26Updated 2 years ago
- A curated list of awesome resources related to anti virtualization techniques☆56Updated 4 months ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆114Updated 2 years ago
- Rizin FLIRT Signature Database☆48Updated 2 years ago
- Signing-key abuse and update exploitation framework☆131Updated 6 months ago
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆22Updated 7 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆56Updated 10 months ago
- Python 2.7 bytecode d̶e̶o̶b̶f̶u̶s̶c̶a̶t̶o̶r unfucker☆208Updated 2 years ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆135Updated 5 months ago