hamarituc / xz-backdoorLinks
☆35Updated last year
Alternatives and similar repositories for xz-backdoor
Users that are interested in xz-backdoor are comparing it to the libraries listed below
Sorting:
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated last year
- XZ backdoor reverse engineering☆98Updated last year
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆64Updated 6 months ago
- Rizin FLIRT Signature Database☆44Updated 2 years ago
- ☆74Updated 9 months ago
- iTLB multihit PoC☆42Updated last year
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆85Updated 2 years ago
- A tasty cross-platform tool from Blacksea to debug shellcode!☆92Updated 2 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆118Updated 10 months ago
- Utility to find hidden Linux kernel modules☆144Updated 2 months ago
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆28Updated last year
- ☆12Updated 2 years ago
- Anti-analysis tool that obfuscates ELF files☆35Updated 4 years ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆82Updated last year
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆67Updated 3 years ago
- ☆24Updated 4 years ago
- ☆89Updated 7 months ago
- Native Rust bindings for @horsicq's Detect-It-Easy☆15Updated 7 months ago
- ☆24Updated last year
- A utility to fix intentionally corrupted UPX packed files.☆90Updated 2 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- Memory-Dump-UEFI is a UEFI application for dumping the contents of RAM.☆175Updated last week
- Manjaro LPE☆34Updated 2 years ago
- Reverse engineering assistant that extracts strings and related pseudo-code from a binary file.☆64Updated this week
- ☆70Updated 2 years ago
- A library for intercepting system calls☆102Updated 8 months ago
- A way to use fonts to obfuscate text.☆47Updated 2 years ago
- Attack tool for altering packed samples so that they evade static packing detection☆19Updated 7 months ago
- Scripts from Ghidra Golf competitions☆34Updated 2 years ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆161Updated 3 years ago