radare / toysLinks
☆30Updated 6 years ago
Alternatives and similar repositories for toys
Users that are interested in toys are comparing it to the libraries listed below
Sorting:
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 7 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆11Updated 3 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 3 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- 🔓 x86 Linux Kernel rootkit for Debian 9 (4.9.0-11-686-pae)☆35Updated 5 years ago
- Launch radare2 like a boss from pwntools in tmux☆26Updated 5 years ago
- A console for assemble/disassemble code using capstone/keystone☆31Updated 7 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- www.phrack.org☆75Updated 2 years ago
- A tool for modding programs on Linux at runtime. Scans memory for values and changes instructions.☆18Updated 4 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆45Updated 6 years ago
- Inject shellcode into running processes in Linux.☆44Updated last year
- Just a modern packer for elf binaries ( works on linux executables only )☆42Updated 4 years ago
- ELF binary infector☆32Updated 14 years ago
- executing JS from x86 code☆27Updated 6 years ago
- PoC Reverse Text segment ELF File infector☆14Updated 5 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆35Updated 8 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 6 years ago
- ☆36Updated 5 years ago
- Dockerized setup for quick pwning☆23Updated 4 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated last month
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Updated 3 years ago
- Anything related to Ghidra☆12Updated 6 years ago
- runtime code injector for Linux☆27Updated 14 years ago
- ELF Virus infection techniques that work with SCOP (Secure code partitioned) executables☆15Updated 6 years ago
- python library for dumping a linux process from memory☆34Updated 15 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- Ghidra plugin to communicate with radare2☆51Updated this week