karcherm / xz-malwareLinks
Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1
☆59Updated last year
Alternatives and similar repositories for xz-malware
Users that are interested in xz-malware are comparing it to the libraries listed below
Sorting:
- WallEscape vulnerability in util-linux☆52Updated last year
- Checks for tpm vulnerabilities☆38Updated 2 years ago
- ☆35Updated last year
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- ☆135Updated last year
- XZ backdoor reverse engineering☆98Updated last year
- Scapy hands-on☆35Updated 2 years ago
- ☆35Updated 10 months ago
- iTLB multihit PoC☆42Updated 2 years ago
- ☆80Updated last year
- Utility to find hidden Linux kernel modules☆147Updated 4 months ago
- ☆52Updated last year
- Userland exec PoC to be used as attack vector technique☆94Updated last month
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆142Updated 3 years ago
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆25Updated 2 months ago
- ☆79Updated last year
- A tool for firmware cartography☆161Updated last week
- io_uring based rootkit☆245Updated 7 months ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year
- yet another hidden LKM hunter☆29Updated 2 months ago
- Ghidra scripts for recovering string definitions in Go binaries☆124Updated 2 weeks ago
- ☆24Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆137Updated 6 months ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆61Updated 3 years ago
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆42Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 4 months ago
- Minimal setup to trigger the xz backdoor☆29Updated last year
- Linux rootkit for educational purposes☆33Updated last year
- eBPF hacks☆188Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 11 months ago