rrbranco / Troopers2015Links
Troopers Conference Supporting Materials
☆12Updated 10 years ago
Alternatives and similar repositories for Troopers2015
Users that are interested in Troopers2015 are comparing it to the libraries listed below
Sorting:
- python inspect rootkit tool☆33Updated 11 years ago
- Collection of scripts for radare2☆27Updated 6 years ago
- OS X rootkit loader version #2☆12Updated 10 years ago
- Interactive Virtual Machine Introspection☆18Updated 7 years ago
- REIL translation library☆36Updated 9 years ago
- ☆70Updated 3 years ago
- ROP based Movfuscator VM☆28Updated 8 years ago
- Translate regular Assembly into Extended Instructions☆88Updated 12 years ago
- Tracing framework for full system simulators☆56Updated 9 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- Abstract Binary Format Manipulation - ELF, PE and Mach-O format☆120Updated 10 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 7 years ago
- ☆38Updated 9 years ago
- ☆15Updated 5 years ago
- asrepl: x86-64 assembly REPL☆71Updated 8 years ago
- Dynamic binary translation framework for instrumenting the Linux kernel and its modules☆77Updated 7 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆43Updated 10 years ago
- A binary analysis tool for linux☆70Updated 5 years ago
- PyAsmJIT is a Python package for x86_64/ARM assembly code generation and execution.☆42Updated 5 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 9 years ago
- Functions Catalog☆28Updated 6 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- ☆28Updated 3 years ago
- IDApro idc and idapython script collection☆28Updated 2 years ago
- Triton based R2 plugin for concolic execution and total control☆33Updated 6 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 8 years ago
- ☆14Updated 9 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Updated 7 years ago
- ☆74Updated 3 years ago