karcherm / xz-malwareLinks
Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1
☆59Updated last year
Alternatives and similar repositories for xz-malware
Users that are interested in xz-malware are comparing it to the libraries listed below
Sorting:
- XZ backdoor reverse engineering☆99Updated last year
- ☆35Updated last year
- ☆137Updated last year
- Scapy hands-on☆35Updated 2 years ago
- WallEscape vulnerability in util-linux☆51Updated last year
- Utility to find hidden Linux kernel modules☆147Updated 6 months ago
- Ghidra scripts for recovering string definitions in Go binaries☆127Updated 2 months ago
- Project containing several tools/ scripts to recover the OpenSSH session keys used to encrypt/ decrypt SSH traffic.☆94Updated last year
- Checks for tpm vulnerabilities☆38Updated 2 years ago
- Linpmem is a linux memory acquisition tool☆95Updated 7 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 6 months ago
- io_uring based rootkit☆249Updated 9 months ago
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆199Updated 2 years ago
- ☆52Updated last year
- Linux rootkit for educational purposes☆34Updated last year
- Binarly Vulnerability Research Advisories☆185Updated 2 weeks ago
- ☆79Updated last year
- BINARLY Research Tools and PoCs☆39Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆138Updated 8 months ago
- Userland exec PoC to be used as attack vector technique☆94Updated 3 months ago
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆43Updated last year
- ugly code to check linux kernel memory and dump some internal structures☆48Updated last year
- A tool for firmware cartography☆165Updated 2 months ago
- A utility to fix intentionally corrupted UPX packed files.☆93Updated 2 years ago
- iTLB multihit PoC☆42Updated 2 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆143Updated 3 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated last year
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆75Updated 10 months ago
- ☆84Updated last year