Binary Golf Examples and Resources
☆261Oct 24, 2025Updated 4 months ago
Alternatives and similar repositories for golfclub
Users that are interested in golfclub are comparing it to the libraries listed below
Sorting:
- Intro to Assembly Optimization stream repo☆30Nov 22, 2021Updated 4 years ago
- Binary Golf Grand Prix☆116Oct 31, 2023Updated 2 years ago
- Generate very tiny reverse shell binaries for Linux~☆76May 22, 2020Updated 5 years ago
- Binary Golf Grand Prix☆86Mar 14, 2026Updated last week
- ☆228May 24, 2023Updated 2 years ago
- EXIF-based command and control PoC☆15Mar 20, 2020Updated 6 years ago
- Binary Golf Library☆61May 1, 2021Updated 4 years ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43May 22, 2024Updated last year
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- A malware analysis and classification tool.☆190Dec 3, 2021Updated 4 years ago
- Protocol Reverse Engineering Resources☆23May 10, 2023Updated 2 years ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆55Oct 19, 2023Updated 2 years ago
- ☆676Mar 25, 2025Updated 11 months ago
- Linux Local Privesc Helper and Agent☆166Dec 2, 2019Updated 6 years ago
- An educational Bochs-based snapshot fuzzer project☆229Oct 27, 2025Updated 4 months ago
- Elf binary infector written in Go.☆215Jan 11, 2025Updated last year
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆244Sep 26, 2023Updated 2 years ago
- Small Rust programs that do weird things☆30Feb 13, 2026Updated last month
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆159Sep 3, 2022Updated 3 years ago
- ☆48Jul 7, 2020Updated 5 years ago
- Secure ELF parsing/loading library for forensics reconstruction of malware, and robust reverse engineering tools☆452Jan 26, 2026Updated last month
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆96Mar 21, 2023Updated 3 years ago
- yxd - Yuu's heX Dumper☆93Jun 26, 2024Updated last year
- ☆448Oct 3, 2024Updated last year
- PoCs for Kernelmode rootkit techniques research.☆435Nov 4, 2025Updated 4 months ago
- quality of life☆19Dec 24, 2019Updated 6 years ago
- Inject DLLs into the explorer process using icons☆407May 18, 2025Updated 10 months ago
- Interface GDB-GEF with Binary Ninja☆58Mar 27, 2021Updated 4 years ago
- Linux Sleep Obfuscation☆112Jan 7, 2024Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- Exploring RPC interfaces on Windows☆346Jan 30, 2024Updated 2 years ago
- Slide of my conference presentations☆14Sep 5, 2024Updated last year
- ☆27May 6, 2024Updated last year
- PageBuster - dump all executable pages of packed processes.☆206Mar 31, 2021Updated 4 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆129Aug 11, 2023Updated 2 years ago
- Coverage-Guided Greybox Distributed Fuzzer☆133Jan 26, 2026Updated last month
- Tools for analyzing EDR agents☆278Jun 10, 2024Updated last year