vrasneur / randkitLinks
Random number rootkit for the Linux kernel
☆28Updated 9 years ago
Alternatives and similar repositories for randkit
Users that are interested in randkit are comparing it to the libraries listed below
Sorting:
- Demo bootloaders - created just for fun☆22Updated 7 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 7 years ago
- Windows SMEP Bypass U=S☆37Updated 9 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Updated 8 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆39Updated 6 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆42Updated 10 years ago
- python library for dumping a linux process from memory☆34Updated 15 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- SIGSTOPing ELF binaries since 0x7E1☆54Updated 10 months ago
- Generic scripts for public consumption☆85Updated 5 years ago
- Programmatic disassembly and patching☆68Updated 8 years ago
- REIL translation library☆36Updated 9 years ago
- Borrowed Instructions Synthetic Computation☆70Updated 10 years ago
- Slides, Papers, Links to CVEs and advisories☆78Updated 7 years ago
- ☆50Updated 8 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Updated 12 years ago
- Translate regular Assembly into Extended Instructions☆87Updated 12 years ago
- quals-2014☆22Updated 10 years ago
- C definitions processor.☆21Updated 7 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆64Updated 10 years ago
- IDAPython plugin for finding Xrefs from a function☆48Updated 8 years ago
- Stealth's 64bit injectso port☆74Updated 14 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- A console for assemble/disassemble code using capstone/keystone☆31Updated 7 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- A Unicorn based emulator to deobfuscate Equation Group string XOR obfuscation☆31Updated 6 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆55Updated 9 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- hidusb.sys source code, Windows 10 hidusb.sys fully reversed☆34Updated 8 years ago