michalmalik / fceLinks
☆22Updated 11 years ago
Alternatives and similar repositories for fce
Users that are interested in fce are comparing it to the libraries listed below
Sorting:
- Notes on QEMU and Debian MIPS (big-endian)☆45Updated 7 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆41Updated 7 years ago
- WinDbg workplace settings that I use for debugging☆16Updated 8 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- Polymorphic VM and PoliCTF '17 reversing challenge.☆72Updated last year
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- As near as possible to bare metal☆48Updated 3 weeks ago
- ELF DSO injector☆71Updated 6 months ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated 2 years ago
- sample linux x86_64 ELF virus☆54Updated 7 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆31Updated 5 years ago
- A console for assemble/disassemble code using capstone/keystone☆32Updated 7 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 9 years ago
- Extract annoations from Ghidra into an X32/X64 dbg database☆57Updated 4 years ago
- Miscellanous scripts used for malware analysis☆23Updated 7 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- Code from the book "Designing BSD Rootkits: An Introduction to Kernel Hacking"☆45Updated 9 years ago
- Basic BIOS emulator for Unicorn Engine.☆100Updated 4 years ago
- Automatically exported from code.google.com/p/narly☆24Updated 4 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆43Updated 6 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Updated 7 years ago
- A novel technique to hide code from debuggers & disassemblers☆159Updated last year
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆112Updated 5 years ago
- Collection of Linux shellcodes☆72Updated 9 years ago
- ☆86Updated 2 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆56Updated 6 years ago
- A fast execution trace symbolizer for Windows.☆129Updated last year
- My own versions from the programs of the book "Practical Binary Analysis"☆55Updated 6 years ago