smx-smx / xzreLinks
XZ backdoor reverse engineering
☆98Updated last year
Alternatives and similar repositories for xzre
Users that are interested in xzre are comparing it to the libraries listed below
Sorting:
- A stealthy ELF loader - no files, no execve, no RWX☆171Updated last year
- ☆80Updated last year
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆177Updated this week
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆59Updated last year
- ☆35Updated last year
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆159Updated 3 years ago
- Arbitrary Speculative Code Execution with Return Instructions☆173Updated last year
- Minimal setup to trigger the xz backdoor☆29Updated last year
- playing with DDR DRAM bus fault injection☆92Updated last year
- 🌐🐧 Browsable Linux kernel syscall tables built with Systrack (https://github.com/mebeim/systrack)☆206Updated 2 months ago
- Ghidra scripts for recovering string definitions in Go binaries☆124Updated 2 weeks ago
- Get rickrolled, right in your favourite NSA reverse engineering tool☆77Updated 2 years ago
- Kernel Read Write Execute☆46Updated 10 months ago
- x86 Real-Mode MS-DOS Emulator using Windows Hypervisor Platform☆142Updated last year
- Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator☆71Updated 8 months ago
- ☆424Updated last year
- ☆156Updated 3 weeks ago
- simple type recognition in decompiled executables☆117Updated last year
- The Decompilation Wiki: info on all things decompilation☆226Updated last week
- yxd - Yuu's heX Dumper☆91Updated last year
- A utility to fix intentionally corrupted UPX packed files.☆90Updated 2 years ago
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries…☆197Updated last year
- Shiva is a programmable dynamic linker for loading ELF microprograms☆34Updated 2 years ago
- A research decompiler implemented as a Binary Ninja plugin.☆212Updated last week
- PoC for PixieFail vulnerabilities☆25Updated last year
- Ghidra Processor Module to disassemble and decompile the x86 Intel Atom microcode☆86Updated 2 years ago
- Writing a self modifying program to play Bad Apple with it's control flow graph☆47Updated 4 years ago
- UEFI and SMM Assessment Tool☆209Updated last year
- ☆89Updated 10 months ago
- This IDA plugin extends the functionality of the assembly and hex view. With this plugin, you can conveniently decode/decrypt/alter data …☆86Updated 6 months ago