A7um / syscallhookLinks
linux system call hook framework
☆47Updated 6 years ago
Alternatives and similar repositories for syscallhook
Users that are interested in syscallhook are comparing it to the libraries listed below
Sorting:
- Qemu Fuzzer.针对Qemu模拟设备的模糊测试工具,主要思路是Host生成种子Data,然后传递给Guest中转程序,由中转程序访问MMIO,以达到和模拟设备的交互,不同于qtest自带的fuzzer.☆44Updated 3 years ago
- 使用intel pin来求解一部分CTF challenge☆32Updated 6 years ago
- 2019 Advent Calendar, vmware pwnables☆50Updated 4 years ago
- 基于angr的污点分析引擎☆39Updated 6 years ago
- Collection of interesting pwnables.☆5Updated 6 years ago
- ☆56Updated 3 years ago
- ☆31Updated 4 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- ☆41Updated 7 years ago
- android kernel pwn☆19Updated 6 years ago
- qemu vulnerablity.☆53Updated 4 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆87Updated 3 years ago
- blog☆16Updated 5 years ago
- 学习angr用,里面可能啥都有☆9Updated 6 years ago
- some useful scripts to solve pwn challenges in ctfs☆13Updated 4 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Updated 6 years ago
- some ida script☆32Updated 3 years ago
- An IDA processor for eBPF bytecode☆65Updated 6 months ago
- A docker environment which could run and debug multiarch program, such as mips, arm☆18Updated 4 years ago
- Various debugging tools such as %DumpObjects for v8☆55Updated 6 years ago
- ☆34Updated 3 years ago
- Something about CTF and vulnerability environment, mainly about kernel exploit.☆46Updated 2 years ago
- adobe afdko fuzz☆41Updated 5 years ago
- a better basefinder☆11Updated 3 years ago
- The best vulnerable driver to learn how to exploit kernel vulnerability.☆31Updated 5 years ago
- Fast-Symbolic-Emulation-Engine. 主要用于自动化逆向约束求解,目的是解决angr的各种不足之处,大学时使用本工具solve了很多ctf题目,毕业后不打ctf了,很少维护了,后面可能会用来做一些其他的程序分析,反混淆也是不错. ( tips: r…☆9Updated 3 months ago
- Merge multi binaries into one IDA database.☆24Updated 3 years ago
- ☆44Updated 4 years ago
- some kernel exploit challenges and cve analysis☆26Updated 6 years ago