m4n3dw0lf / Assembly-x64
My Collection of x64 Assembly programs with NASM
☆21Updated 6 years ago
Alternatives and similar repositories for Assembly-x64:
Users that are interested in Assembly-x64 are comparing it to the libraries listed below
- Library for Dissect and Infect ELF Binaries.☆40Updated 9 years ago
- PyAsmJIT is a Python package for x86_64/ARM assembly code generation and execution.☆42Updated 5 years ago
- ☆17Updated 6 years ago
- Linux kernel modules developed by me for learning purposes☆19Updated 12 years ago
- Small script to assemble/disassemble from CLI☆22Updated 2 years ago
- Naive Proof of Concept Crypter for GNU/Linux ELF64☆10Updated 7 years ago
- Red-team tool to hook libc read syscall with a buffer overflow vulnerability.☆35Updated 6 years ago
- Copy of the contents at phrack.com☆38Updated 5 months ago
- A simple ELF Virus that can execute malacious code, infect other ELF files, and execute the host file's code normally.☆41Updated 6 years ago
- Simple Polymorphic x86_64 Runtime Code Segment Cryptor☆57Updated 6 years ago
- git clone all repositories and gists from a given GitHub username☆32Updated 3 years ago
- A collection of code examples e.g. a buffer overflow + exploit, crypter, shellcodes and more.☆16Updated 10 months ago
- A collection of shellcodes☆67Updated 12 years ago
- ☆19Updated 10 years ago
- This is a very simple Keylogger, it doesn't hide itself and is a college project building towards developing a rootkit.☆21Updated 10 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆37Updated 11 years ago
- An educational Linux Kernel Rootkit☆31Updated 3 years ago
- Just another (unfinished) kernel from scratch...☆45Updated 3 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- Perl wrapper for the capstone library☆12Updated 7 years ago
- Ghidra plugin to start an r2 webserver to let r2 interact with it☆47Updated last week
- Just a proof of concept Linux rootkit that reads from syscalls.☆22Updated 6 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- An example rootkit that gives a userland process root permissions☆78Updated 5 years ago
- ☆19Updated 10 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆84Updated 5 years ago
- A command line Swiss army knife for string and number conversions☆17Updated 4 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 4 years ago
- Tracing and parsing an executing binary file☆28Updated 9 years ago