Collection of simple anti-debugging tricks for Linux
☆59Apr 10, 2018Updated 7 years ago
Alternatives and similar repositories for debugmenot
Users that are interested in debugmenot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux ptrace anti-debugging demo☆43Aug 4, 2022Updated 3 years ago
- ☆16Dec 21, 2023Updated 2 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆19Jul 25, 2021Updated 4 years ago
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆17Jan 7, 2017Updated 9 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆54Dec 5, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- elfcrypter is a free, open source, ELF ( Executable and Linkable Format ) software protector, written in C/C++ and Assembler. Support for…☆28Feb 20, 2014Updated 12 years ago
- ☆17Sep 29, 2023Updated 2 years ago
- A x86/64 library for detouring functions on Windows OS☆51Jan 26, 2022Updated 4 years ago
- MCSema Build Windows download☆11Jul 6, 2020Updated 5 years ago
- A python RCE exploit on QNAP-QTS☆15Sep 15, 2020Updated 5 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Apr 1, 2017Updated 9 years ago
- ☆23Jan 15, 2019Updated 7 years ago
- 🕵️ The crappy, magical string Java/Android decrypter☆11Jan 26, 2020Updated 6 years ago
- Extracting the strings from the .dex files with meaning.☆12Nov 16, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Obfuscation method using virtual machines.☆28Mar 2, 2020Updated 6 years ago
- QNAP N-Day (Probably not CVE-2020-2509)☆14Jul 27, 2022Updated 3 years ago
- A simple and heavily documented series of test hypervisors built for 64-bit Windows 10 systems running under Intel's VT-x☆35Dec 27, 2020Updated 5 years ago
- A simple golang reverse engineering ida plugin☆19Dec 16, 2020Updated 5 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- ☆55Sep 14, 2018Updated 7 years ago
- libvirtcpuid provides transparent CPUID virtualization, all in userspace.☆30Mar 14, 2024Updated 2 years ago
- code obfuscation via control flow flattening☆13Jan 5, 2018Updated 8 years ago
- this repo is deprecated, see the binaryen repo☆27Dec 5, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- First level taint implementation with qemu for linux user mode☆28Aug 11, 2020Updated 5 years ago
- Example usage of Dyninst☆15Feb 16, 2026Updated last month
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Dec 25, 2017Updated 8 years ago
- SWAT - System-Wide Analysis Toolkit☆16Oct 4, 2021Updated 4 years ago
- KLEE Symbolic Execution Engine☆61Oct 27, 2019Updated 6 years ago
- ☆27Oct 16, 2017Updated 8 years ago
- Ansible Playbooks mainly for SmartOS Joyent/LX Zones☆11Feb 1, 2019Updated 7 years ago
- A Binary Ninja plugin to disassemble bytecode for PlaidCTF 2020 challenge "That's a Lot of Fish"☆13Apr 19, 2020Updated 5 years ago
- Clone of "Compiler-Agnostic Function Detection in Binaries" source code☆87Mar 17, 2026Updated 3 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Network monitoring probe with plugins for anomaly detection☆12Sep 20, 2019Updated 6 years ago
- implementation of some function from string.h using SSE2 instructions☆21Oct 5, 2016Updated 9 years ago
- A Linux backdoor with the goal of circumventing network firewalls.☆16Nov 30, 2011Updated 14 years ago
- ☆69Nov 19, 2024Updated last year
- ☆11Sep 17, 2020Updated 5 years ago
- Analyze Golang with x64dbg☆28Mar 20, 2026Updated 3 weeks ago