linuxthor / asmLinks
assembly language examples, mostly Linux
☆46Updated 5 years ago
Alternatives and similar repositories for asm
Users that are interested in asm are comparing it to the libraries listed below
Sorting:
- ☆53Updated 6 years ago
- ☆36Updated 7 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆33Updated 2 months ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆62Updated 6 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆63Updated 4 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Copy of the contents at phrack.com☆41Updated 9 months ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 7 months ago
- Challenges and vulnerabilities exploitation.☆59Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆31Updated 5 years ago
- A regular expression fuzzer.☆45Updated 7 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- collection of verified Linux kernel exploits☆190Updated 5 years ago
- Intro to Assembly Optimization stream repo☆28Updated 4 years ago
- (Linux Kernel) Stack Monitoring Tool☆48Updated 3 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- This tool gives you the Linux system call number (32bit and 64bit x86) for a system call name (e.g., read, write, ...).☆26Updated 2 years ago
- LKRG bypass methods☆73Updated 6 years ago
- Simple unpacking script for Ezuri ELF Crypter☆35Updated 4 years ago
- gtfo, now with the speed of golang☆62Updated 5 years ago
- Firmware analysis website + API☆43Updated 5 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 6 years ago