netspooky / i2aoLinks
Intro to Assembly Optimization stream repo
☆26Updated 3 years ago
Alternatives and similar repositories for i2ao
Users that are interested in i2ao are comparing it to the libraries listed below
Sorting:
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- The Multiplatform Linux Sandbox☆16Updated last year
- Reverse Engineering tools, scripts, and general commentary☆59Updated 6 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆96Updated 5 months ago
- ☆36Updated 4 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- ☆28Updated 6 years ago
- ☆36Updated 6 years ago
- Binary Protocol Differ☆119Updated 5 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 5 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- a pstree mod that prints other helpful information and with added functionality☆25Updated 5 years ago
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16Updated 5 months ago
- Binary Golf Library☆62Updated 4 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆11Updated 3 years ago
- ☆48Updated 5 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆30Updated 5 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated 2 years ago
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- Tool to examine the behaviour of setuid binaries under constrained limits.☆61Updated 4 years ago
- ☆21Updated 3 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- Vagrant setup for building a machine for CTF/exploit development☆22Updated 6 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- 0-ring rootkit revealer for Linux☆29Updated 6 years ago