karcherm / xz-malware
Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1
☆58Updated 10 months ago
Alternatives and similar repositories for xz-malware:
Users that are interested in xz-malware are comparing it to the libraries listed below
- XZ backdoor reverse engineering☆94Updated 9 months ago
- ☆34Updated last year
- Minimal setup to trigger the xz backdoor☆27Updated 6 months ago
- A library for intercepting system calls☆76Updated 4 months ago
- iTLB multihit PoC☆40Updated last year
- Rust Linux Kernel Module designed for LKM rootkit detection☆44Updated last month
- PoC for PixieFail vulnerabilities☆22Updated last year
- ☆26Updated 2 years ago
- Linpmem is a linux memory acquisition tool☆82Updated last year
- ☆133Updated last year
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆41Updated 11 months ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆85Updated 2 years ago
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆53Updated last month
- Open Source eBPF Malware Analysis Framework☆48Updated 6 months ago
- Userland exec PoC to be used as attack vector technique☆85Updated 3 months ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year
- Linux rootkit for educational purposes☆31Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 4 months ago
- Uncovering Container Confusion in the Linux Kernel☆43Updated last year
- ☆23Updated 8 months ago
- ☆77Updated 11 months ago
- PoC code and tools for Black Hat USA 2024☆21Updated 9 months ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆51Updated 2 years ago
- DEbian Cve REproducer Tool☆24Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated last month
- Checks for tpm vulnerabilities☆37Updated 2 years ago
- ☆12Updated 2 years ago
- ☆28Updated 3 months ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆31Updated 2 years ago
- Slides about HyperDbg☆30Updated last month