malware-unicorn / xori-ogLinks
☆16Updated 6 years ago
Alternatives and similar repositories for xori-og
Users that are interested in xori-og are comparing it to the libraries listed below
Sorting:
- A set of scripts for a radare-based malware code analysis workflow☆68Updated 7 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 6 years ago
- Flare-On solutions☆37Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 6 years ago
- A Python tool to generate ROP chains☆65Updated 11 months ago
- Personal repository for all ctf related stuffs☆67Updated last year
- Attacking the Core associated source files☆89Updated 8 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆31Updated 5 years ago
- Binary Ninja Posters☆35Updated 5 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 8 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆92Updated 6 years ago
- ☆53Updated 7 years ago
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- pyGoRE - Python library for analyzing Go binaries☆66Updated 3 years ago
- ☆91Updated 6 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆44Updated 7 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Updated 6 years ago
- Slides and stuffs of the meetings during the 2019☆33Updated 3 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Write-ups for crackmes and CTF challenges☆54Updated 3 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆51Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- ☆116Updated 9 years ago
- ☆21Updated 6 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆25Updated 10 years ago