hamarituc / xz-backdoorLinks
☆36Updated last year
Alternatives and similar repositories for xz-backdoor
Users that are interested in xz-backdoor are comparing it to the libraries listed below
Sorting:
- XZ backdoor reverse engineering☆99Updated last year
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆59Updated last year
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆74Updated 9 months ago
- A tasty cross-platform tool from Blacksea to debug shellcode!☆92Updated 2 years ago
- iTLB multihit PoC☆42Updated 2 years ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆86Updated 3 years ago
- Rizin FLIRT Signature Database☆51Updated 2 years ago
- Native Rust bindings for @horsicq's Detect-It-Easy☆18Updated last month
- ☆89Updated 10 months ago
- A stealthy ELF loader - no files, no execve, no RWX☆172Updated 2 years ago
- IDA's Lumina feature, reimplemented for Ghidra☆24Updated 2 years ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆89Updated last year
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆29Updated last year
- Ghidra scripts for recovering string definitions in Go binaries☆125Updated last month
- CLI program to calculate the entropy of files☆74Updated last month
- A library for intercepting system calls☆103Updated last year
- curiosity got me here☆45Updated last year
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Get rickrolled, right in your favourite NSA reverse engineering tool☆74Updated 2 years ago
- ☆24Updated last year
- ☆12Updated 3 years ago
- 🥷 Soothing pastel theme for Binary Ninja☆26Updated 8 months ago
- Code injection from Linux kernel to a process☆24Updated 2 years ago
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆31Updated last year
- Modifies the Blue Screen of Death for 1909/20h1/20h2/21h1.☆167Updated 3 years ago
- ☆136Updated last year
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated 2 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Updated 3 years ago
- ☆70Updated 2 years ago
- Simple ELF runtime packer for creating self-protecting binaries☆22Updated 2 years ago