mfaerevaag / elfinjector
Code injector for ELF binaries (incl. PIE)
☆27Updated 7 years ago
Alternatives and similar repositories for elfinjector:
Users that are interested in elfinjector are comparing it to the libraries listed below
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆27Updated 4 years ago
- Helper script for Linux kernel disassemble or debugging with IDA Pro on VMware + GDB stub (including some symbols helpers)☆36Updated last year
- ELF packer for i386☆32Updated 9 years ago
- Collection of simple anti-debugging tricks for Linux☆56Updated 6 years ago
- Build your emulation environment as needed☆65Updated 3 years ago
- Qiling Framework Documentation☆15Updated 10 months ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆81Updated 5 years ago
- Rizin FLIRT Signature Database☆39Updated last year
- Sample Binary Ninja Plugin☆20Updated last year
- Code injection from Linux kernel to a process☆19Updated last year
- bash script and modified java program to headlessly use ghidra's decompiler☆55Updated 2 years ago
- BPF Processor for IDA Python☆51Updated 6 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆25Updated last year
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 4 years ago
- An IDA plugin that allows you to use /proc/kallsyms output to import function and data labels into an extracted Android kernel image.☆66Updated 5 years ago
- Python based angr plug in for IDA Pro.☆34Updated 6 years ago
- Investigating the bug behind CVE-2021-26708☆27Updated 4 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆109Updated 4 years ago
- plugin for storing and using snippets of useful Binja script☆22Updated 5 months ago
- Making Type Info Library (TIL) file for Apache modules☆54Updated 3 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆27Updated 4 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- IDA SIG files for multiarch uClibc library☆38Updated 6 years ago
- Binary Ninja plugin to clean up some common obfuscation techniques.☆19Updated 4 years ago
- A firmware base address search tool.☆44Updated 8 months ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 10 years ago
- Naive Proof of Concept Crypter for GNU/Linux ELF64☆10Updated 7 years ago
- just an experiment☆21Updated 6 years ago
- a taint tracer based on DynamoRIO, currently ARM only☆41Updated 4 years ago
- PoC for a taint based attack on VMProtect☆109Updated 5 years ago