netspooky / i2ao
Intro to Assembly Optimization stream repo
☆25Updated 3 years ago
Alternatives and similar repositories for i2ao:
Users that are interested in i2ao are comparing it to the libraries listed below
- ☆36Updated 5 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆25Updated 3 years ago
- ☆27Updated 5 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆29Updated last year
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 4 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 4 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Exfiltration based on custom X509 certificates☆26Updated last year
- ☆48Updated 4 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆26Updated 3 years ago
- 0-ring rootkit revealer for Linux☆29Updated 5 years ago
- ☆22Updated 4 years ago
- ☆16Updated 3 years ago
- a pstree mod that prints other helpful information and with added functionality☆24Updated 4 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- ☆18Updated 5 years ago
- Binary Golf Library☆62Updated 3 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆50Updated 6 years ago
- The Dumb Network Fuzzer☆19Updated last year
- ☆20Updated 5 years ago
- Flare-On solutions☆36Updated 5 years ago
- Crackme challenge☆17Updated 4 years ago
- ☆12Updated 5 years ago
- POC viruses I have created to demo some ideas☆59Updated 4 years ago