hamarituc / xz-backdoorLinks
☆35Updated last year
Alternatives and similar repositories for xz-backdoor
Users that are interested in xz-backdoor are comparing it to the libraries listed below
Sorting:
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆59Updated last year
- XZ backdoor reverse engineering☆99Updated last year
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆75Updated 10 months ago
- Rizin FLIRT Signature Database☆51Updated 2 years ago
- A tasty cross-platform tool from Blacksea to debug shellcode!☆92Updated 2 years ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆86Updated 3 years ago
- PT_NOTE to PT_LOAD x64 ELF infector written in Assembly☆49Updated 4 years ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆90Updated last year
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆158Updated 3 years ago
- A utility to fix intentionally corrupted UPX packed files.☆93Updated 2 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆127Updated 2 months ago
- iTLB multihit PoC☆42Updated 2 years ago
- A binary hardening system☆111Updated 2 years ago
- ☆89Updated 11 months ago
- Native Rust bindings for @horsicq's Detect-It-Easy☆18Updated 2 months ago
- ☆84Updated last year
- A stealthy ELF loader - no files, no execve, no RWX☆174Updated 2 years ago
- Reimplementation of Microsoft's Warbird obuscator☆156Updated last year
- Guest lecture about modern DRM analysis at Ruhr-Universität Bochum.☆13Updated last year
- World's First Haiku Ransomware/Malware☆15Updated last year
- Utility to find hidden Linux kernel modules☆146Updated 6 months ago
- Report and exploit of CVE-2023-36427☆90Updated 2 years ago
- The Linux x86/x86-64 last chance debugging tool☆48Updated 3 years ago
- Ftrace Based Linux Loadable Kernel Module Rootkit for Linux Kernel 5.x and 6.x on x86_64, hides files, hides process, hides bind shell & …☆28Updated last week
- ☆35Updated 3 years ago
- A curated list of awesome resources related to anti virtualization techniques☆59Updated 6 months ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Updated 3 years ago
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆31Updated last year
- ugly code to check linux kernel memory and dump some internal structures☆48Updated last year
- Asus AsIO2 Local Privilege Escalation exploit (based on ReWolf's MSI exploit)☆14Updated 5 years ago