zhuyifei1999 / elf-x86_64-obfuscate
A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.
☆18Updated 6 years ago
Alternatives and similar repositories for elf-x86_64-obfuscate:
Users that are interested in elf-x86_64-obfuscate are comparing it to the libraries listed below
- Python based angr plug in for IDA Pro.☆34Updated 7 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- ☆14Updated 7 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 4 years ago
- ☆12Updated 7 years ago
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Updated 5 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 6 years ago
- collection of used Tools for CTFs☆15Updated 3 years ago
- ROP Payload Compiler☆11Updated 7 years ago
- ☆17Updated 6 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Updated 7 years ago
- Basic x86 Symbolic Execution for educational purposes☆18Updated 7 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Updated 6 years ago
- ☆14Updated 7 years ago
- ☆13Updated 7 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago
- Vagrant setup for building a machine for CTF/exploit development☆22Updated 5 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 5 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- ROP based Movfuscator VM☆28Updated 8 years ago
- prebuild angr wheels for Windows on x86_64☆14Updated 6 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Updated 8 years ago
- Ditto.☆17Updated 4 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 8 years ago
- expansion of afl-unicorn using c++☆28Updated 5 years ago
- Cross-Qt compatibility module for IDAPython.☆13Updated 5 years ago
- Kernel Cache Decryption for iOS☆14Updated 3 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Updated 6 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- PoC code for CVE-2018-9539☆18Updated 6 years ago