hamarituc / xz-backdoor
☆34Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for xz-backdoor
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆57Updated 5 months ago
- XZ backdoor reverse engineering☆91Updated 3 months ago
- ☆23Updated 7 months ago
- iTLB multihit PoC☆40Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆78Updated last month
- x86 Real-Mode MS-DOS Emulator using Windows Hypervisor Platform☆98Updated 4 months ago
- ☆12Updated 2 years ago
- Keep it secret, keep it safe☆75Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆42Updated last year
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated last year
- Python3 scripts that executes an elf (Linux executable format) completely in memory.☆24Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆49Updated last year
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆80Updated 2 years ago
- A stealthy ELF loader - no files, no execve, no RWX☆156Updated 10 months ago
- A TikTok - Live Watcher application for tty / cli - for the unlikely situation when you live in tty, but want to watch TikTok Live.☆25Updated 2 months ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆73Updated 3 months ago
- A simple Jupyter Notebook to graph a users commit history over time, specifically looking at the author of the xz backdoor.☆20Updated 7 months ago
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆28Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆71Updated 9 months ago
- XZ Backdoor Extract(Test on Ubuntu 23.10)☆16Updated 7 months ago
- Signing-key abuse and update exploitation framework☆121Updated last week
- An implementation of execve() in user space☆21Updated last month
- Minimal setup to trigger the xz backdoor☆23Updated last month
- A way to use fonts to obfuscate text.☆43Updated last year
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆26Updated 5 months ago
- RetDec Decompiler Plugin for Rizin☆28Updated 5 months ago
- Open Source eBPF Malware Analysis Framework☆44Updated last month
- Utility to find hidden Linux kernel modules☆147Updated last year
- Static analysis tool that can identify potential ransomware on PE or ELF files based on heuristics☆14Updated 10 months ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated last year