tsarpaul / GLORYHookLinks
The first Linux hooking framework to allow merging two binary files into one!
☆95Updated 3 months ago
Alternatives and similar repositories for GLORYHook
Users that are interested in GLORYHook are comparing it to the libraries listed below
Sorting:
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- ☆135Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆30Updated 5 years ago
- Flare-On solutions☆36Updated 5 years ago
- A git history of Windows filesystems☆76Updated 5 years ago
- ☆48Updated 5 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆92Updated 6 years ago
- ☆36Updated 5 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated last year
- A repository for my conference presentations☆35Updated 5 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆68Updated 5 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆110Updated 5 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆86Updated 6 years ago
- Ghidra plugin to communicate with radare2☆60Updated 2 weeks ago
- Reflective Polymorphism☆106Updated 7 years ago
- A novel technique to hide code from debuggers & disassemblers☆156Updated last year
- The Dumb Network Fuzzer☆20Updated 2 years ago
- List of real-world threats against endpoint protection software☆216Updated 3 weeks ago
- pyGoRE - Python library for analyzing Go binaries☆64Updated 3 years ago
- ☆46Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Tool to make in memory man in the middle☆125Updated 6 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆110Updated 5 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 6 years ago