Binary-Gecko / perf_PoC
☆13Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for perf_PoC
- Open Source eBPF Malware Analysis Framework☆43Updated last month
- ☆30Updated last year
- ☆31Updated 5 months ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆47Updated 3 weeks ago
- Kernel Read Write Execute☆37Updated 2 months ago
- Proof of concept code for CVE-2023-2008☆35Updated last year
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆59Updated last year
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆80Updated 2 years ago
- ☆59Updated 9 months ago
- poc code for CVE-2024-38080☆27Updated 2 months ago
- Easy way to run a LLVM instrumented kernel in qemu with gdb☆21Updated 7 months ago
- A MBR Fuzzer☆28Updated 7 months ago
- Windows KASLR bypass using prefetch side-channel☆68Updated 6 months ago
- Linux rootkit for educational purposes☆25Updated 7 months ago
- Uncovering Container Confusion in the Linux Kernel☆43Updated 8 months ago
- Reverse Engineering and Observability toolkit for Draytek firewalls☆29Updated last month
- Scaling best-practice AFLPlusPlus fuzzing campaigns made easy☆52Updated this week
- Report and exploit of CVE-2023-36427☆87Updated 11 months ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year
- ☆9Updated last month
- A hacky tool for analysing linux kernel commits☆37Updated last year
- ☆74Updated 2 months ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆22Updated 7 months ago
- V8sandbox_bypass using stack misalignment☆17Updated 2 months ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆111Updated 2 weeks ago
- Binary exploitation by confusing the unwinder☆59Updated last year
- ☆18Updated last year
- Linux kernel LPE practice with an NPD vulnerability☆36Updated last year
- CTF challenges that I created☆18Updated 2 years ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆42Updated 4 months ago