t00sh / elf-poison
Proof Of Concept for inserting code in ELF binaries.
☆26Updated 11 years ago
Alternatives and similar repositories for elf-poison:
Users that are interested in elf-poison are comparing it to the libraries listed below
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆9Updated 7 years ago
- ☆16Updated 7 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 8 years ago
- A tiny tool to learn the assembly code☆11Updated 8 years ago
- Diaphora, a Free and Open Source program diffing tool☆23Updated 5 years ago
- ROP gadget finder and analysis in pure Javascript☆29Updated 2 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated 2 years ago
- Samples of binary with different formats and architectures. A test suite for your binary analysis tools.☆22Updated 10 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- r2yara - Module for Yara using radare2 information☆34Updated last year
- Static and Dynamic exploit analysis framework.☆22Updated 10 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- ☆24Updated 9 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 11 years ago
- Undefined Behaviour Snippets☆17Updated 8 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 8 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- repository with additional materials and source code☆31Updated 8 years ago
- Cross-referencing network communication for detecting Advanced Persistent Threat (APT) malware☆6Updated 9 years ago
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 10 years ago
- Debugger for HTC phones bootloader (HBOOT).☆19Updated 11 years ago
- ☆12Updated 7 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago