linuxthor / uulLinks
ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.
☆39Updated 5 years ago
Alternatives and similar repositories for uul
Users that are interested in uul are comparing it to the libraries listed below
Sorting:
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- Intro to Assembly Optimization stream repo☆26Updated 4 years ago
- ☆49Updated 7 years ago
- Binary Ninja Posters☆35Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 6 months ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Format string exploitation helper☆46Updated 10 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- General Research Repository - Only updated when I feel like it☆28Updated last year
- SIGSTOPing ELF binaries since 0x7E1☆55Updated last year
- Attacking the Core associated source files☆88Updated 7 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆30Updated 5 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 7 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- A novel technique to hide code from debuggers & disassemblers☆159Updated last year
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Python repository containing parsed standard C library function and argument information☆28Updated 7 years ago
- A Python tool to generate ROP chains☆64Updated 10 months ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- X41 Smartcard Fuzzer☆120Updated 6 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39Updated 6 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆62Updated 4 years ago