PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution
☆30Sep 10, 2020Updated 5 years ago
Alternatives and similar repositories for elf_dynsym_obfuscation
Users that are interested in elf_dynsym_obfuscation are comparing it to the libraries listed below
Sorting:
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- Repository of exploits for research purposes☆15Jul 12, 2023Updated 2 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆29Sep 11, 2021Updated 4 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Mar 18, 2015Updated 11 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Aug 11, 2019Updated 6 years ago
- Utility for displaying which compiler was used for creating an ELF file + basic info☆25Dec 28, 2025Updated 2 months ago
- ☆17Oct 5, 2020Updated 5 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆58Dec 25, 2021Updated 4 years ago
- Some tools when playing with HarmonyOS NEXT☆32Feb 4, 2026Updated last month
- ☆13Dec 7, 2023Updated 2 years ago
- A simple Java Agent template with javassist support.☆30May 2, 2024Updated last year
- Deploy your own AOSPXRef☆27Jan 4, 2025Updated last year
- Talpa Kernel file access interception modules☆17Oct 12, 2022Updated 3 years ago
- this is Android Custom Linker by Android12 LinkerSourcesCode☆45Apr 3, 2024Updated last year
- Load a DLL from memory☆35Nov 19, 2021Updated 4 years ago
- iOS的越狱和非越狱环境下直接对指定地址函数进行hook的框架,支持宏定义直接切换☆57May 15, 2025Updated 10 months ago
- Sophos Deobfuscation Tool. Deobfuscates passwords obfuscated with Sophos Obfuscation Tool.☆18Jan 29, 2018Updated 8 years ago
- Resume FuncOutline by idapython☆28Aug 20, 2024Updated last year
- ASLREKT is a proof of concept for an unfixed generic local ASLR bypass in Linux.☆26Feb 10, 2020Updated 6 years ago
- A solution for llvmvm in MRCTF2022☆11Apr 27, 2022Updated 3 years ago
- Obfuscates dynamic symbol table☆136Jan 10, 2019Updated 7 years ago
- xnu-10.10 mach-o loader that compiles in userland☆19Aug 5, 2015Updated 10 years ago
- The tool can be used to eliminate redundant instructions in a basic block.☆81Jul 17, 2023Updated 2 years ago
- Linux assembly language minimal 'dynamic ELF' example plus experiments☆25May 22, 2020Updated 5 years ago
- IDA plugin that displays the P-code for the current function☆72Nov 18, 2025Updated 4 months ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 13 years ago
- A runtime-independent crate for transforming Wasm-DWARF☆12Mar 11, 2020Updated 6 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 8 years ago
- ☆16May 15, 2020Updated 5 years ago
- JavaScript Engine Exploits in CTF☆39Oct 30, 2018Updated 7 years ago
- ☆10Mar 6, 2026Updated 2 weeks ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Jul 27, 2018Updated 7 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago
- 研究内核改机策略☆70Mar 13, 2024Updated 2 years ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago
- a lightweight, multi-platform, multi-architecture hook framework.☆25Dec 9, 2024Updated last year
- fix dex by dump dexCodeItem☆46Jun 29, 2024Updated last year