linuxthor / asmLinks
assembly language examples, mostly Linux
☆44Updated 4 years ago
Alternatives and similar repositories for asm
Users that are interested in asm are comparing it to the libraries listed below
Sorting:
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- ☆36Updated 7 years ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆62Updated 6 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆96Updated 4 months ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- ☆52Updated 6 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- collection of verified Linux kernel exploits☆189Updated 4 years ago
- www.phrack.org☆78Updated 2 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated last year
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 6 years ago
- gtfo, now with the speed of golang☆62Updated 5 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago
- A regular expression fuzzer.☆45Updated 7 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- ☆36Updated 4 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- a pstree mod that prints other helpful information and with added functionality☆25Updated 5 years ago
- CLI tool for PKCS7 padding oracle attacks☆140Updated 4 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- LKRG bypass methods☆73Updated 5 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago