hamarituc / xz-backdoorLinks
☆35Updated last year
Alternatives and similar repositories for xz-backdoor
Users that are interested in xz-backdoor are comparing it to the libraries listed below
Sorting:
- XZ backdoor reverse engineering☆98Updated last year
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆58Updated last year
- iTLB multihit PoC☆42Updated last year
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆64Updated 5 months ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆85Updated 2 years ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- ☆12Updated 2 years ago
- Rizin FLIRT Signature Database☆44Updated 2 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆118Updated 9 months ago
- A tasty cross-platform tool from Blacksea to debug shellcode!☆92Updated 2 years ago
- 🥷 Soothing pastel theme for Binary Ninja☆26Updated 4 months ago
- A stealthy ELF loader - no files, no execve, no RWX☆169Updated last year
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆82Updated last year
- ☆24Updated last year
- Manjaro LPE☆34Updated 2 years ago
- Embed a ZIP or JAR file within a PNG image to create a tweetable and "executable" PNG-ZIP/JAR polyglot.☆36Updated last week
- ELEGANTBOUNCER is a detection tool for file-based mobile exploits.☆58Updated this week
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆162Updated 2 years ago
- A curated list of awesome resources related to anti virtualization techniques☆54Updated last month
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 8 months ago
- A library for intercepting system calls☆101Updated 7 months ago
- Utility to find hidden Linux kernel modules☆144Updated last month
- A way to use fonts to obfuscate text.☆47Updated 2 years ago
- PageBuster - dump all executable pages of packed processes.☆203Updated 4 years ago
- ☆74Updated 8 months ago
- ☆88Updated 6 months ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆67Updated 3 years ago
- Native Rust bindings for @horsicq's Detect-It-Easy☆15Updated 7 months ago
- GPU rootkit PoC by Team Jellyfish☆100Updated 10 years ago
- An SSH metadata analyser used to showcase a timing-based attack on the protocol.☆28Updated last year