A python implementation of a grep friendly ftrace wrapper
☆80Jun 25, 2019Updated 6 years ago
Alternatives and similar repositories for linux_plumber
Users that are interested in linux_plumber are comparing it to the libraries listed below
Sorting:
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- A Bayesian Method for the Induction of Probalistic Networks from Data☆19Jul 6, 2017Updated 8 years ago
- In motherland, target network calls you!☆61Sep 4, 2018Updated 7 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 8 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆32Feb 23, 2020Updated 6 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 6 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Certificate Export Utility☆26May 1, 2020Updated 5 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Feb 2, 2023Updated 3 years ago
- Exploit Android MSM8974 Chipset☆13Aug 20, 2015Updated 10 years ago
- HORSEPILL rootkit PoC☆233Aug 5, 2016Updated 9 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- OpenCV based IDN option generator PoC☆39Jan 18, 2017Updated 9 years ago
- A simple embedded Linux backdoor.☆199Oct 25, 2020Updated 5 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- ☆68Nov 15, 2022Updated 3 years ago
- POCs for IOMemoryDescriptor racing bugs in iOS/OSX kernels☆20Jan 8, 2017Updated 9 years ago
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Feb 6, 2015Updated 11 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- GrSecurity and PaX Patches Before End of Public Release☆64Jun 26, 2018Updated 7 years ago
- A Python extension for managing External Memory Data Structures (EMDs)☆51Aug 26, 2024Updated last year
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Feb 9, 2018Updated 8 years ago
- ☆12Jun 1, 2016Updated 9 years ago
- ☆16May 22, 2014Updated 11 years ago
- ELF packer for i386☆32Dec 14, 2015Updated 10 years ago
- Cronbased Dirty Cow Exploit☆30Jan 30, 2017Updated 9 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 5 years ago
- POLAR☆74Feb 13, 2019Updated 7 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.☆243Sep 13, 2021Updated 4 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Nov 14, 2019Updated 6 years ago
- ☆19Mar 24, 2017Updated 8 years ago
- Android kernel module to bypass SELinux at boot☆44Apr 10, 2016Updated 9 years ago