n4sm / AD_1DALinks
Another linux ELF packer to evade hash detection.
☆35Updated 4 years ago
Alternatives and similar repositories for AD_1DA
Users that are interested in AD_1DA are comparing it to the libraries listed below
Sorting:
- Just a modern packer for elf binaries ( works on linux executables only )☆41Updated 4 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆67Updated 3 years ago
- Anti-reverse Compilation☆34Updated 4 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆55Updated 3 years ago
- GPU rootkit PoC by Team Jellyfish☆100Updated 10 years ago
- Tutorial on how to write the dumbest obfuscator I could think of.☆178Updated 5 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Matryoshka - stacked LKM loader☆54Updated 2 years ago
- a collection of elf file infectors☆27Updated 4 years ago
- Reverse text segment x64 ELF infector written in Assembly☆20Updated 4 years ago
- ☆48Updated 5 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆47Updated 4 years ago
- In line function hooking LKM rootkit☆51Updated 5 years ago
- ☆28Updated 6 years ago
- Exploits I've authored☆60Updated 6 years ago
- TrashDBG the world's worse debugger☆23Updated 3 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- A set of small utilities, helpers for PIN tracers☆34Updated 3 weeks ago
- Simple Polymorphic x86_64 Runtime Code Segment Cryptor☆58Updated 7 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- Code injection from Linux kernel to a process☆24Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- Set of antianalysis techniques found in malware☆131Updated 2 years ago
- PoC for hiding PE exports☆67Updated 4 years ago
- Silent Monero (XMR) CPU miner☆23Updated 7 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Updated 4 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- The first Linux hooking framework to allow merging two binary files into one!☆96Updated 5 months ago
- Binary Ninja plugin for exploring Structured Exception Handlers☆82Updated last year