netspooky / golfclubView external linksLinks
Binary Golf Examples and Resources
☆259Oct 24, 2025Updated 3 months ago
Alternatives and similar repositories for golfclub
Users that are interested in golfclub are comparing it to the libraries listed below
Sorting:
- Intro to Assembly Optimization stream repo☆30Nov 22, 2021Updated 4 years ago
- Generate very tiny reverse shell binaries for Linux~☆76May 22, 2020Updated 5 years ago
- Binary Golf Grand Prix☆84Dec 29, 2025Updated last month
- ☆228May 24, 2023Updated 2 years ago
- Binary Golf Grand Prix☆116Oct 31, 2023Updated 2 years ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆54Oct 19, 2023Updated 2 years ago
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- Binary Golf Library☆61May 1, 2021Updated 4 years ago
- ☆59Oct 24, 2024Updated last year
- Elf binary infector written in Go.☆215Jan 11, 2025Updated last year
- Slide of my conference presentations☆14Sep 5, 2024Updated last year
- ☆48Jul 7, 2020Updated 5 years ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43May 22, 2024Updated last year
- ☆664Mar 25, 2025Updated 10 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆95Oct 7, 2024Updated last year
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆243Sep 26, 2023Updated 2 years ago
- Inject DLLs into the explorer process using icons☆403May 18, 2025Updated 8 months ago
- An educational Bochs-based snapshot fuzzer project☆226Oct 27, 2025Updated 3 months ago
- Python tool to check rootkits in Windows kernel☆207Aug 20, 2025Updated 5 months ago
- A malware analysis and classification tool.☆190Dec 3, 2021Updated 4 years ago
- Linux Sleep Obfuscation☆107Jan 7, 2024Updated 2 years ago
- Protocol Reverse Engineering Resources☆23May 10, 2023Updated 2 years ago
- Secure ELF parsing/loading library for forensics reconstruction of malware, and robust reverse engineering tools☆447Jan 26, 2026Updated 3 weeks ago
- Interface GDB-GEF with Binary Ninja☆59Mar 27, 2021Updated 4 years ago
- ☆446Oct 3, 2024Updated last year
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆96Mar 21, 2023Updated 2 years ago
- ☆137Apr 15, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- ☆35Jan 27, 2025Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- ☆27May 6, 2024Updated last year
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆85May 13, 2024Updated last year
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆159Sep 3, 2022Updated 3 years ago
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆157Nov 23, 2025Updated 2 months ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Dec 16, 2024Updated last year
- A multi-arch assembly REPL and emulator for your command line.☆312Dec 7, 2024Updated last year
- ☆13Nov 10, 2020Updated 5 years ago
- ☆12Jun 29, 2021Updated 4 years ago