xcellerator / libgolfLinks
Binary Golf Library
☆61Updated 4 years ago
Alternatives and similar repositories for libgolf
Users that are interested in libgolf are comparing it to the libraries listed below
Sorting:
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- yxd - Yuu's heX Dumper☆90Updated last year
- Binary Golf Examples and Resources☆257Updated last year
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆49Updated 2 years ago
- Binary Golf Grand Prix☆113Updated last year
- Anti-reverse Compilation☆34Updated 4 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆119Updated 10 months ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- ☆18Updated 5 years ago
- ☆28Updated 3 years ago
- [SPOILER ALERT] My attempt at tackling the x86_64 asm riddles in xorpd's xchg rax,rax book. Pull requests welcome.☆88Updated last year
- Binary Golf Grand Prix☆61Updated 6 months ago
- short crackme for Windows XP SP3 (32 bit version). ring0 stuff. IMO very fun x-)☆23Updated 2 years ago
- Protocol Reverse Engineering Resources☆23Updated 2 years ago
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆106Updated last year
- ☆43Updated 3 years ago
- A library for patching ELFs☆57Updated 4 years ago
- An architecture-agnostic ELF file flattener for shellcode☆217Updated 3 years ago
- ☆48Updated 5 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆50Updated 10 months ago
- a pstree mod that prints other helpful information and with added functionality☆24Updated 5 years ago
- Fork Free Fail Repeat☆49Updated 4 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆74Updated 2 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆67Updated 3 years ago
- ☆12Updated 3 years ago
- Cross-architecture instruction counting for CTF solving☆47Updated 3 years ago
- ☆81Updated 4 months ago