zhuyifei1999 / elf-x86_64-obfuscateLinks
A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.
☆18Updated 6 years ago
Alternatives and similar repositories for elf-x86_64-obfuscate
Users that are interested in elf-x86_64-obfuscate are comparing it to the libraries listed below
Sorting:
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- ☆14Updated 7 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆38Updated 5 years ago
- A stateful fuzzing engine.☆45Updated 6 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 7 years ago
- vm escape exploit☆39Updated 8 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 5 years ago
- ELF/PE/Mach-O parsing library☆51Updated last year
- ROP based Movfuscator VM☆28Updated 8 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆67Updated 8 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- Plugins for IDA Pro and Hex-Rays☆46Updated 7 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32Updated 10 years ago
- sample linux x86_64 ELF virus☆53Updated 7 years ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Updated 6 years ago
- Large Scale Cumulative Binary Diffing.☆25Updated 7 years ago
- z3 scripts and ctf challenge solutions.☆24Updated 2 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Updated 6 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆38Updated 8 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- Fetch and set configuration values from IDAPython scripts☆24Updated last week
- collection of used Tools for CTFs☆15Updated 3 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 7 years ago
- Simulate afl-fuzz☆16Updated 6 years ago
- Recover control flow graph from obfuscated codes☆39Updated 10 years ago
- IDA PDB Loader☆48Updated 7 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Updated 7 years ago
- Allows IDA PRO to disassemble x86-64 code (WOW64) in 32-bit database☆25Updated 3 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆41Updated 6 years ago
- ☆12Updated 8 years ago