smx-smx / xzre
XZ backdoor reverse engineering
☆90Updated last month
Related projects: ⓘ
- A stealthy ELF loader - no files, no execve, no RWX☆151Updated 8 months ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆56Updated 3 months ago
- simple type recognition in decompiled executables☆96Updated 2 months ago
- Binary Type Inference Ghidra Plugin☆138Updated 7 months ago
- Python Command-Line Ghidra Decompiler☆86Updated 4 months ago
- ☆65Updated 2 months ago
- Arbitrary Speculative Code Execution with Return Instructions☆150Updated 7 months ago
- Quarkslab Bindiffer but not only !☆169Updated last week
- UEFI and SMM Assessment Tool☆161Updated 4 months ago
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆139Updated 2 weeks ago
- Binary Golf Grand Prix☆43Updated 2 weeks ago
- Minimal setup to trigger the xz backdoor☆21Updated 5 months ago
- Simple syscall sandboxing for Linux☆127Updated last month
- An architecture-agnostic ELF file flattener for shellcode☆213Updated 2 years ago
- ☆23Updated 5 months ago
- Overview of Secure-Launch process on Qualcomm devices☆54Updated 7 months ago
- A research decompiler implemented as a Binary Ninja plugin.☆171Updated 2 weeks ago
- Ghidra scripts for recovering string definitions in Go binaries☆100Updated 3 months ago
- Writing a self modifying program to play Bad Apple with it's control flow graph☆38Updated 3 years ago
- Nyxstone: assembly / disassembly library based on LLVM, implemented in C++ with Rust and Python bindings, maintained by emproof.com☆307Updated last month
- Binary Golf Grand Prix☆109Updated 10 months ago
- ☆411Updated last week
- The Decompilation Wiki: info on all things decompilation☆124Updated last month
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆176Updated 8 months ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆151Updated 2 years ago
- ☆80Updated 8 months ago
- Demonstrate ability to read memfd_secret() data from the kernel☆57Updated 9 months ago
- 🌐🐧 Browsable linux kernel syscall tables built with Systrack (https://github.com/mebeim/systrack)☆147Updated 2 months ago
- Shiva is a programmable dynamic linker for loading ELF microprograms☆29Updated last year
- ☆109Updated last year