libc database (file in packages, hash, package files, symbols). Raw binary libc available on https://github.com/BestPig/libc-bin)
☆32Feb 24, 2025Updated last year
Alternatives and similar repositories for libc-db
Users that are interested in libc-db are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 驱动开发工具包☆11Dec 8, 2018Updated 7 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- ☆31Feb 20, 2022Updated 4 years ago
- A fully implemented kernel exploit for the PS4 with HEN - Only for 10.50☆11Aug 15, 2024Updated last year
- Binary Ninja plugin for importing symbols to a kernel binary from /proc/kallsyms☆21Oct 3, 2025Updated 5 months ago
- ¯\_(ツ)_/¯☆30Dec 16, 2019Updated 6 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Dec 14, 2017Updated 8 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆103Nov 24, 2019Updated 6 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆34Jun 6, 2021Updated 4 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Apr 20, 2016Updated 9 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- clang-based search engine for C/C++ data structures, classes, prototypes & macros☆103Jul 15, 2025Updated 8 months ago
- Port of the classic first-person-shooter DOOM to Xbox for DEFCON 27 CTF☆26Aug 20, 2019Updated 6 years ago
- Reversing library based off sleigh from the Ghidra project. Pcode IR access, disassembly, C++17☆13Nov 12, 2021Updated 4 years ago
- Collection of images and examples to use with Shoggoth.☆19Aug 24, 2020Updated 5 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- Run your Binary Ninja Python console in a separate Terminal window.☆18Nov 1, 2018Updated 7 years ago
- A library for patching ELFs☆62Dec 4, 2020Updated 5 years ago
- Volumetric Development☆11Mar 19, 2024Updated 2 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- Group coding repository of PltCov, a tool to instrument ELF binaries for fuzzing with ngram coverage of imported APIs☆12Jan 18, 2022Updated 4 years ago
- View Linux perf traces in IDA Pro☆15Nov 18, 2019Updated 6 years ago
- This is an implementation of the Language Server Protocol for Jimple. It enables your IDE to provide code exploring features while workin…☆12Dec 15, 2023Updated 2 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆77Nov 12, 2019Updated 6 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- Making Type Info Library (TIL) file for Apache modules☆58Mar 25, 2021Updated 4 years ago
- Rewriting functions in compiled binaries using McSema☆93Aug 6, 2019Updated 6 years ago
- ☆60Jan 1, 2021Updated 5 years ago
- Kernel exploits and writeups☆17May 11, 2022Updated 3 years ago
- ☆47May 18, 2020Updated 5 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Nov 2, 2019Updated 6 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆283Jul 22, 2020Updated 5 years ago
- ☆19Dec 28, 2021Updated 4 years ago
- CVE-2021-42287/CVE-2021-42278 Exploiter☆13Jan 12, 2023Updated 3 years ago
- Cobalt Strike 插件包,超级缝合怪...☆11Jul 11, 2025Updated 8 months ago
- WebKit/JSC CodeQL Databases☆17Dec 15, 2025Updated 3 months ago
- ☆11Feb 11, 2023Updated 3 years ago