ulexec / ElfLockerLinks
PoC multi-layer protector for ELF32 x86 binaries
☆12Updated 3 years ago
Alternatives and similar repositories for ElfLocker
Users that are interested in ElfLocker are comparing it to the libraries listed below
Sorting:
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆31Updated 5 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- ☆88Updated last year
- x86 bootloader emulation with Miasm (case of NotPetya)☆43Updated 6 years ago
- Flare-On solutions☆37Updated 6 years ago
- ☆17Updated 5 years ago
- PANDA-powered tracing engine for tenet☆11Updated 3 years ago
- pyGoRE - Python library for analyzing Go binaries☆66Updated 3 years ago
- PoC Reverse Text segment ELF File infector☆14Updated 5 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆50Updated 4 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- ☆28Updated 5 years ago
- An Integrity-Check Monitoring Pintool☆58Updated 5 years ago
- Containerized IDA Pro (Windows/Wine), DEPRECIATED, please use https://github.com/NyaMisty/docker-wine-ida☆27Updated 8 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 6 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 4 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- ☆48Updated 5 years ago
- ☆35Updated 3 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Exploits for YARA 3.7.1 & 3.8.1☆32Updated 6 years ago
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆22Updated 3 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆56Updated 6 years ago
- ☆34Updated 4 years ago
- A stateful fuzzing engine.☆45Updated 7 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 8 years ago
- Analysis of VBS exploit CVE-2018-8174☆31Updated 7 years ago
- ☆14Updated 2 years ago