linuxthor / asm
assembly language examples, mostly Linux
☆44Updated 4 years ago
Alternatives and similar repositories for asm:
Users that are interested in asm are comparing it to the libraries listed below
- Tool to examine the behaviour of setuid binaries under constrained limits.☆62Updated 4 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 4 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- ☆36Updated 6 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 5 years ago
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆47Updated 2 years ago
- Lazily wraps various Linux system auditing tools☆17Updated last year
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Simple unpacking script for Ezuri ELF Crypter☆32Updated 3 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- A Platform for Testing Secure Coding/Config☆18Updated 6 years ago
- LKRG bypass methods☆71Updated 5 years ago
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆22Updated 4 years ago
- Burp Commander written in Go☆57Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- Copy of the contents at phrack.com☆38Updated 2 weeks ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆60Updated 5 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 5 years ago
- My little precious collection of Linux 4.x kernel rootkits☆25Updated 8 months ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- the puppy proxy☆22Updated 4 years ago
- This tool gives you the Linux system call number (32bit and 64bit x86) for a system call name (e.g., read, write, ...).☆25Updated last year
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆21Updated 6 years ago
- ☆25Updated 3 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago