netspooky / i2aoLinks
Intro to Assembly Optimization stream repo
☆25Updated 3 years ago
Alternatives and similar repositories for i2ao
Users that are interested in i2ao are comparing it to the libraries listed below
Sorting:
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 3 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- 0-ring rootkit revealer for Linux☆28Updated 5 years ago
- ☆36Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- A collection of my public security advisories.☆23Updated last month
- PoC multi-layer protector for ELF32 x86 binaries☆11Updated 3 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 4 years ago
- a pstree mod that prints other helpful information and with added functionality☆24Updated 4 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 6 years ago
- Radare2 Metadata Extraction to Elasticsearch☆22Updated last year
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- ☆27Updated 5 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- ☆13Updated 4 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Hash collisions and their exploitations☆9Updated 2 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆51Updated 6 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Binary Golf Library☆62Updated 4 years ago