A reimplementation of GNU readelf, using Ryan O'Neill's innovative library, libelfmaster.
☆10Sep 28, 2019Updated 6 years ago
Alternatives and similar repositories for readelfmaster
Users that are interested in readelfmaster are comparing it to the libraries listed below
Sorting:
- ☆13Dec 29, 2022Updated 3 years ago
- QuickPatch: A patching tool☆13Oct 20, 2019Updated 6 years ago
- View Linux perf traces in IDA Pro☆15Nov 18, 2019Updated 6 years ago
- GDB + GEF cheatsheet for reversing binaries☆74Sep 24, 2023Updated 2 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆50Apr 6, 2018Updated 7 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- Export a binary from ghidra to emulate with unicorn☆27Oct 25, 2019Updated 6 years ago
- Investigating the bug behind CVE-2021-26708☆28Feb 16, 2021Updated 5 years ago
- Secure ELF parsing/loading library for forensics reconstruction of malware, and robust reverse engineering tools☆449Jan 26, 2026Updated last month
- ☆25Aug 10, 2018Updated 7 years ago
- ☆35Oct 25, 2021Updated 4 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- ☆32Nov 15, 2017Updated 8 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- PoC code for CVE-2017-13253☆37Oct 1, 2020Updated 5 years ago
- C standard library and communication layer for the Supercard DSTwo☆14Sep 29, 2017Updated 8 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Apr 16, 2018Updated 7 years ago
- Source code (LaTeX) for a somewhat irregular Sinclair QL assembly language eComic.☆12Jan 31, 2026Updated last month
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- DHCP Leases widget for pfSense☆11Nov 23, 2017Updated 8 years ago
- AI Class Wiki☆11Oct 11, 2011Updated 14 years ago
- Go eBPF Library☆12Jul 9, 2016Updated 9 years ago
- A profiler that uses ebpf to produce pprof-format profiles☆12Jun 22, 2018Updated 7 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- (Linux Kernel) Stack Monitoring Tool☆48Jan 31, 2022Updated 4 years ago
- AES Key Bruteforcer, used to disclose proper keys for Arm9LoaderHax exploit☆11May 19, 2016Updated 9 years ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Jan 2, 2017Updated 9 years ago
- Linux network namespace sysctl safety verifier.☆11Jun 20, 2021Updated 4 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Proof of concept for CVE-2018-4150 by @cmwdotme☆14May 8, 2018Updated 7 years ago
- fuzz testing framework for Linux system calls☆12Sep 4, 2015Updated 10 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- domain information in JSON format☆10Jun 7, 2017Updated 8 years ago
- This is a program that runs on a Raspberry Pi to decode ADS-B data and plot aircraft data (position, type, speed, etc).☆11Nov 9, 2018Updated 7 years ago
- Presentations, Videos, and Sample Source from Austin LLVM Meetups☆11Jul 23, 2020Updated 5 years ago
- ☆30Nov 25, 2025Updated 3 months ago
- Script that reads in a transactions .csv exported from Mint.com and writes it out as a ledger .dat file.☆12Mar 2, 2016Updated 10 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago