netspooky / i2ao
Intro to Assembly Optimization stream repo
☆25Updated 3 years ago
Alternatives and similar repositories for i2ao:
Users that are interested in i2ao are comparing it to the libraries listed below
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- ☆36Updated 5 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- Radare2 Metadata Extraction to Elasticsearch☆22Updated 9 months ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆25Updated 3 years ago
- a pstree mod that prints other helpful information and with added functionality☆24Updated 4 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Launch radare2 like a boss from pwntools in tmux☆23Updated 5 years ago
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆49Updated 6 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆27Updated 4 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆26Updated 3 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- Abusing the FreeBSD MAC framework for rootkits☆11Updated 7 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆10Updated 3 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Skeleton project for your own GRUB-based bootkit☆15Updated 5 years ago
- ☆22Updated 4 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- ☆27Updated 5 years ago
- 0-ring rootkit revealer for Linux☆28Updated 5 years ago
- The Dumb Network Fuzzer☆19Updated last year
- Toolset to analyze disks encrypted with McAFee FDE technology☆17Updated 4 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- Crystal Anti-Exploit Protection 2012☆36Updated 4 years ago