ExploitEducation / NebulaLinks
☆11Updated 6 years ago
Alternatives and similar repositories for Nebula
Users that are interested in Nebula are comparing it to the libraries listed below
Sorting:
- ☆36Updated 4 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 5 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Binary Golf Library☆61Updated 4 years ago
- 0-ring rootkit revealer for Linux☆29Updated 6 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆59Updated 5 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Linux Rootkits (4.x Kernel)☆87Updated 4 years ago
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- unofficial fork of inetsim - official source at http://www.inetsim.org/ - changes in branch "pimped"☆30Updated 9 years ago
- Reverse engineering challenges☆52Updated 6 years ago
- SSD Challenges☆48Updated 3 years ago
- Intro to Assembly Optimization stream repo☆26Updated 4 years ago
- Anti-reverse Compilation☆34Updated 4 years ago
- A C-based checksec without readelf or grep dependance.☆11Updated 4 years ago
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 3 years ago
- ☆53Updated 2 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆71Updated 4 years ago
- ☆182Updated 5 years ago
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 3 years ago
- ☆65Updated 9 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆73Updated 3 years ago
- ☆34Updated 7 years ago
- Code snippets for Qiling Tutorials☆21Updated 5 years ago
- ☆36Updated 7 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- x64 Windows Exploit Development☆115Updated last year
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago