ulexec / ElfLockerLinks
PoC multi-layer protector for ELF32 x86 binaries
☆11Updated 3 years ago
Alternatives and similar repositories for ElfLocker
Users that are interested in ElfLocker are comparing it to the libraries listed below
Sorting:
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆30Updated 5 years ago
- pyGoRE - Python library for analyzing Go binaries☆64Updated 3 years ago
- An Integrity-Check Monitoring Pintool☆58Updated 4 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆41Updated 6 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆47Updated 4 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- ☆17Updated 4 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Flare-On solutions☆36Updated 5 years ago
- ☆87Updated 11 months ago
- PoC Reverse Text segment ELF File infector☆14Updated 5 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- PANDA-powered tracing engine for tenet☆11Updated 3 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Binary matching with Binary Ninja☆21Updated last year
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- ☆34Updated 4 years ago
- ☆76Updated 3 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆31Updated 6 years ago
- My notes about Genyatyk VM crackme☆26Updated 5 years ago
- python library for dumping a linux process from memory☆34Updated 15 years ago
- ☆28Updated 5 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- ☆52Updated 6 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Export a binary from ghidra to emulate with unicorn☆27Updated 5 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago