seblau / linux-anti-debuggingLinks
Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature
☆17Updated 9 years ago
Alternatives and similar repositories for linux-anti-debugging
Users that are interested in linux-anti-debugging are comparing it to the libraries listed below
Sorting:
- x86_64 linux rootkit using debug registers☆53Updated 4 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- My conference presentations and publications☆26Updated 3 years ago
- A repository with simple projects created for testing/learning purpose☆46Updated last month
- My solutions for HackSys Extreme Vulnerable Driver☆12Updated 7 years ago
- Dalvik Header Plugin for IDA Pro☆23Updated 13 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆32Updated 8 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 8 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 11 years ago
- A collection of tools for injecting DSOs in processes under various operating systems☆51Updated 3 years ago
- ☆50Updated 8 years ago
- Symbol REPL☆31Updated 7 years ago
- General purpose repository for miscellaneous scripts, pcaps and malware IOCs that we share with the info-sec research community☆39Updated last month
- Fetch and set configuration values for IDA Plugins☆25Updated 2 months ago
- ☆34Updated 8 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 4 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 5 years ago
- Kernel Stack info leak at exportObjectToClient function☆42Updated 6 years ago
- Windbg Utility Tools based upon PyKD☆42Updated 5 years ago
- CVE-2018-4330 POC for iOS☆17Updated 7 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Updated 7 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36Updated 9 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆59Updated 9 years ago
- reverse engineering, visual binary analysis☆24Updated 9 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆43Updated 6 years ago
- A stateful fuzzing engine.☆45Updated 7 years ago
- ☆36Updated 6 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Updated 8 years ago