Skip to content

Instantly share code, notes, and snippets.

/*
* callgraph.c
*
* Subroutine-rich sample to help testing
* any type of analysis tooling involving callgraphs,
* whether static or dynamic.
*
* Each function implements some type of edge case
* that one may want to consider covering in their tool,
* such as function pointers.
@ex0dus-0x
ex0dus-0x / memfd_unpack.py
Last active November 3, 2022 23:50
Unpacking memfd malware with Qiling
#!/usr/bin/env python3
"""
memfd_unpack.py
AUTHOR
Alan <ex0dus-0x>
DESCRIPTION
Using Qiling to unpack and decompress a sample being loaded
and executed in-memory.
@ex0dus-0x
ex0dus-0x / Vagrantfile
Created February 24, 2020 17:49
Personal vagrantfile
# encoding: utf-8
# -*- mode: ruby -*-
# vi: set ft=ruby :
VAGRANT_BOX = 'bento/ubuntu-18.10'
VM_NAME = 'vagrant'
VM_USER = 'vagrant'
MAC_USER = 'alan'
HOST_PATH = '/Users/' + MAC_USER + '/Code/'
@ex0dus-0x
ex0dus-0x / test.c
Last active March 10, 2021 20:07
Throwing the KLEE symbolic execution engine against crypto libraries
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include "monocypher/monocypher.c"
#include "tweetnacl/tweetnacl.h"
#include <klee/klee.h>
int
main(int argc, char **argv)
#include <stdio.h>
#include <string.h>
#include <unistd.h>
#include <stdlib.h>
#include "include/secp256k1.h"
#include "field_impl.h"
#include "secp256k1.c"