shailrshah / ELF-Virus
A simple ELF Virus that can execute malacious code, infect other ELF files, and execute the host file's code normally.
☆42Updated 6 years ago
Alternatives and similar repositories for ELF-Virus:
Users that are interested in ELF-Virus are comparing it to the libraries listed below
- ELF packer/crypter that aims to create hardened and stealthy troyans☆53Updated 3 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆23Updated 4 years ago
- sample linux x86_64 ELF virus☆53Updated 6 years ago
- Ghidra plugin to start an r2 webserver to let r2 interact with it☆48Updated last month
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 4 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆10Updated 7 years ago
- ☆12Updated 7 years ago
- It is demonstration tool that contains collection techniques to detect the virtualisation environment in Linux Operating System.☆24Updated 6 years ago
- ☆12Updated 8 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Updated 6 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Bootkit for Windows 7☆28Updated 10 years ago
- LKM Rootkit based on Diamorphine☆15Updated 6 years ago
- User-mode part of Zerokit platform☆20Updated 6 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆14Updated 5 years ago
- Simple Polymorphic x86_64 Runtime Code Segment Cryptor☆57Updated 7 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- A collection of anti disassembly techniques☆18Updated 7 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- BlazeFox Exploit☆18Updated 6 years ago
- Python based angr plug in for IDA Pro.☆34Updated 7 years ago
- ☆45Updated 6 years ago
- A tiny framework for easily manipulate the tty and create fake binaries.☆155Updated 5 years ago
- Gozi-MBR-rootkit Bootkit Modified☆67Updated 8 years ago
- Zerokit shared code☆16Updated 6 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆135Updated 7 years ago
- Backdoor for Windows systems (client and server) writen in C (client) and ASM (server) using reverse connection☆19Updated 10 years ago
- Kernel mode windows NT API logger☆22Updated 5 years ago
- Windows Malware☆41Updated 11 years ago