GJDuck / RedFatLinks
A binary hardening system
☆111Updated 2 years ago
Alternatives and similar repositories for RedFat
Users that are interested in RedFat are comparing it to the libraries listed below
Sorting:
- LKRG bypass methods☆73Updated 6 years ago
- A system call interception tool☆57Updated last year
- Explore a live Linux kernel's memory using GDB☆117Updated 3 years ago
- Binary exploitation by confusing the unwinder☆68Updated 2 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Updated last year
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 4 years ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆158Updated 3 years ago
- ☆92Updated 7 months ago
- A de-socketing library for fuzzing.☆164Updated 5 months ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆69Updated last year
- Reverse engineering software using a full system simulator☆191Updated 2 weeks ago
- Linux Kernel N-day Exploit/Analysis.☆67Updated last year
- Generation-based, context-free grammar fuzzer.☆53Updated 3 years ago
- Alcatraz project for Black Hat USA 2021☆78Updated 4 years ago
- Binarly Vulnerability Research Advisories☆185Updated last week
- Ghidra scripts for recovering string definitions in Go binaries☆127Updated 2 months ago
- ☆133Updated last week
- Coverage-Guided Greybox Distributed Fuzzer☆132Updated last week
- Files used for reproducing Fuzzware's experiments☆61Updated 2 years ago
- A hacky tool for analysing linux kernel commits☆38Updated 2 years ago
- Fork Free Fail Repeat☆48Updated 4 years ago
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆154Updated 2 years ago
- ☆103Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- An automated setup for compiling & fuzzing Apache httpd server☆51Updated 2 years ago
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆135Updated 3 weeks ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆96Updated 2 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated last year
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆51Updated last year