michalmalik / fce
☆19Updated 10 years ago
Alternatives and similar repositories for fce:
Users that are interested in fce are comparing it to the libraries listed below
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- Patch a Windows PE (.exe, .dll, etc..) so it no longer loads with a random dynamic base. Saves changing breakpoint addresses between debu…☆15Updated 4 years ago
- Ghidra plugin to start an r2 webserver to let r2 interact with it☆46Updated 3 weeks ago
- Import DynamoRIO drcov code coverage data into Ghidra☆42Updated last year
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- Demo bootloaders - created just for fun☆22Updated 7 years ago
- Diaphora, a Free and Open Source program diffing tool☆22Updated 5 years ago
- WinDbg workplace settings that I use for debugging☆14Updated 7 years ago
- Heap analysis tooling for dlmalloc☆27Updated 2 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- A console for assemble/disassemble code using capstone/keystone☆30Updated 6 years ago
- Python based angr plug in for IDA Pro.☆34Updated 6 years ago
- Toshiba MeP-c4 for Ghidra☆22Updated 5 years ago
- QuickPatch: A patching tool☆12Updated 5 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆44Updated 6 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- General purpose repository for miscellaneous scripts, pcaps and malware IOCs that we share with the info-sec research community☆37Updated 4 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆135Updated 7 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 4 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆65Updated 3 years ago
- A rootkit implemented as a linux kernel module☆17Updated 9 years ago
- ROP based Movfuscator VM☆28Updated 8 years ago
- This is the python wrapper for The Security Framework SRDF☆49Updated 10 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- Anti live forensic linux LKM rootkit☆17Updated 7 years ago
- Configure SPI flash write protection.☆23Updated 4 years ago
- ☆50Updated 7 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 6 years ago
- Bootkits Revisited☆41Updated 10 years ago