michalmalik / fceLinks
☆21Updated 10 years ago
Alternatives and similar repositories for fce
Users that are interested in fce are comparing it to the libraries listed below
Sorting:
- Notes on QEMU and Debian MIPS (big-endian)☆45Updated 6 years ago
- WinDbg workplace settings that I use for debugging☆16Updated 8 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆41Updated 6 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Demo bootloaders - created just for fun☆22Updated 8 years ago
- ViDi Visual Disassembler (experimental)☆76Updated 2 years ago
- PoC Reverse Text segment ELF File infector☆14Updated 5 years ago
- Polymorphic VM and PoliCTF '17 reversing challenge.☆73Updated 11 months ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆90Updated last year
- Rootkit Detector for UNIX☆61Updated 2 years ago
- ELF DSO injector☆67Updated 2 months ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆54Updated 6 years ago
- A console for assemble/disassemble code using capstone/keystone☆31Updated 7 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆30Updated 5 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- ☆50Updated 8 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- Collection of Linux shellcodes☆72Updated 9 years ago
- ROP based Movfuscator VM☆28Updated 8 years ago
- Extract annoations from Ghidra into an X32/X64 dbg database☆58Updated 4 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- Experiments on C/C++ Exploits☆22Updated 5 years ago
- Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.☆81Updated 4 years ago
- 0-ring rootkit revealer for Linux☆28Updated 5 years ago
- Ghidra plugin to communicate with radare2☆59Updated last week
- sample linux x86_64 ELF virus☆53Updated 7 years ago
- Diaphora, a Free and Open Source program diffing tool☆23Updated 6 years ago
- Generic scripts for public consumption☆85Updated 6 years ago