romainthomas / the-poor-mans-obfuscator
Binary & scripts associated with "The Poor Man's Obfuscator" presentation
☆225Updated 2 years ago
Alternatives and similar repositories for the-poor-mans-obfuscator
Users that are interested in the-poor-mans-obfuscator are comparing it to the libraries listed below
Sorting:
- Windows Network File System Crash PoC☆87Updated 2 years ago
- Recursive MMIO VM Escape PoC☆175Updated 3 years ago
- ☆124Updated 2 years ago
- Call Tree Overviewer☆364Updated last month
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- ROPfuscator is a fine-grained code obfuscation framework for C/C++ programs using ROP (return-oriented programming).☆425Updated last year
- Proof-of-concept and write-up for the CVE-2022-32832 vulnerability patched in iOS 15.6☆97Updated 2 years ago
- A simple program to hook the current process to identify the manual syscall executions on windows☆257Updated 2 years ago
- Static Binary Instrumentation tool for Windows x64 executables☆202Updated 2 weeks ago
- a PE Loader and Windows API tracer. Useful in malware analysis.☆138Updated 2 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆222Updated last year
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆121Updated 3 years ago
- Idapython script to carve binary for internal RPC structures☆233Updated last year
- Slides & Hands-on for the reverse engineering workshop☆179Updated 2 years ago
- Obfuscator as LLVM extension☆100Updated 3 years ago
- ☆97Updated 3 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆168Updated last year
- Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.☆456Updated 2 years ago
- This IDA plugin extends the functionality of the assembly and hex view. With this plugin, you can conveniently decode/decrypt/alter data …☆81Updated 2 months ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆227Updated 2 years ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆115Updated last year
- Abusing exceptions for code execution.☆111Updated 2 years ago
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆169Updated last year
- ☆243Updated 2 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆227Updated 2 years ago
- Exploit for CVE-2022-30206☆75Updated 2 years ago
- A simple ptrace-less shared library injector for x64 Linux☆259Updated 2 years ago
- IDA plugin to pinpoint obfuscated code☆140Updated 3 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆111Updated 6 months ago
- compile-time control flow obfuscation using mba☆182Updated last year