PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution
☆30Sep 10, 2020Updated 5 years ago
Alternatives and similar repositories for elf_dynsym_obfuscation
Users that are interested in elf_dynsym_obfuscation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 4 years ago
- Repository of exploits for research purposes☆15Jul 12, 2023Updated 2 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆29Sep 11, 2021Updated 4 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Aug 11, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Utility for displaying which compiler was used for creating an ELF file + basic info☆25Dec 28, 2025Updated 3 months ago
- ☆17Oct 5, 2020Updated 5 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Jun 16, 2020Updated 5 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆58Dec 25, 2021Updated 4 years ago
- Some tools when playing with HarmonyOS NEXT☆33Feb 4, 2026Updated 2 months ago
- ☆13Dec 7, 2023Updated 2 years ago
- Rootkit Detector for UNIX☆61Aug 11, 2023Updated 2 years ago
- A simple Java Agent template with javassist support.☆30May 2, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Deploy your own AOSPXRef☆27Jan 4, 2025Updated last year
- Talpa Kernel file access interception modules☆17Oct 12, 2022Updated 3 years ago
- Load a DLL from memory☆35Nov 19, 2021Updated 4 years ago
- iOS的越狱和非越狱环境下直接对指定地址函数进行hook的框架,支持宏定义直接切换☆57May 15, 2025Updated 10 months ago
- Sophos Deobfuscation Tool. Deobfuscates passwords obfuscated with Sophos Obfuscation Tool.☆18Jan 29, 2018Updated 8 years ago
- Resume FuncOutline by idapython☆28Aug 20, 2024Updated last year
- A solution for llvmvm in MRCTF2022☆11Apr 27, 2022Updated 3 years ago
- Obfuscates dynamic symbol table☆136Jan 10, 2019Updated 7 years ago
- xnu-10.10 mach-o loader that compiles in userland☆19Aug 5, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Linux assembly language minimal 'dynamic ELF' example plus experiments☆25May 22, 2020Updated 5 years ago
- H2HC 2019 Slides/Materials/Presentations☆56Dec 17, 2019Updated 6 years ago
- IDA plugin that displays the P-code for the current function☆72Nov 18, 2025Updated 4 months ago
- Gadget IoC removal from HAK5's BashBunny☆21Aug 10, 2023Updated 2 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 13 years ago
- A runtime-independent crate for transforming Wasm-DWARF☆12Mar 11, 2020Updated 6 years ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆472Updated this week
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆16Apr 11, 2017Updated 9 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- JavaScript Engine Exploits in CTF☆39Oct 30, 2018Updated 7 years ago
- ☆16May 15, 2020Updated 5 years ago
- ☆10Mar 6, 2026Updated last month
- ☆11Sep 26, 2019Updated 6 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago
- 研究内核改机策略☆70Mar 13, 2024Updated 2 years ago
- An AIDL interface scanning tool for Android source code.☆31Jun 20, 2024Updated last year