romainthomas / the-poor-mans-obfuscatorLinks
Binary & scripts associated with "The Poor Man's Obfuscator" presentation
☆229Updated 3 years ago
Alternatives and similar repositories for the-poor-mans-obfuscator
Users that are interested in the-poor-mans-obfuscator are comparing it to the libraries listed below
Sorting:
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆158Updated 3 years ago
- Recursive MMIO VM Escape PoC☆173Updated 3 years ago
- Windows Network File System Crash PoC☆88Updated 3 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆125Updated last month
- ROPfuscator is a fine-grained code obfuscation framework for C/C++ programs using ROP (return-oriented programming).☆438Updated last year
- Slides & Hands-on for the reverse engineering workshop☆184Updated 3 years ago
- a PE Loader and Windows API tracer. Useful in malware analysis.☆143Updated 3 years ago
- Report and exploit of CVE-2023-36427☆88Updated 2 years ago
- This IDA plugin extends the functionality of the assembly and hex view. With this plugin, you can conveniently decode/decrypt/alter data …☆86Updated 7 months ago
- Tutorial on how to write the dumbest obfuscator I could think of.☆178Updated 5 years ago
- Static Binary Instrumentation tool for Windows x64 executables☆207Updated 3 months ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆123Updated 3 years ago
- Binary Ninja plugin to analyze and simplify obfuscated code☆233Updated 3 months ago
- Modified Emscripten compiler with LLVM-level obfuscation☆62Updated last year
- The Linux x86/x86-64 last chance debugging tool☆48Updated 3 years ago
- ☆165Updated 4 years ago
- A simple ptrace-less shared library injector for x64 Linux☆278Updated 2 years ago
- Obfuscator as LLVM extension☆108Updated 3 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆125Updated 11 months ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆235Updated 2 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆130Updated 3 years ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆176Updated 5 months ago
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆187Updated last year
- Call Tree Overviewer☆392Updated 4 months ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- Abusing exceptions for code execution.☆113Updated 2 years ago
- ☆82Updated last year
- A dynamic unpacking tool☆145Updated 2 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆81Updated last month