HexHive / scudo-exploitationView external linksLinks
☆52Oct 21, 2024Updated last year
Alternatives and similar repositories for scudo-exploitation
Users that are interested in scudo-exploitation are comparing it to the libraries listed below
Sorting:
- Yet another PyInstaller unpacking/decompilation tool☆19Dec 31, 2019Updated 6 years ago
- vasilisk☆19Dec 23, 2019Updated 6 years ago
- link a linux ELF .so library into memory with python and call functions in it, even if you're not on linux☆10Feb 5, 2020Updated 6 years ago
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 8 months ago
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes an…☆11Aug 14, 2024Updated last year
- Unpacks java-to-exe files converted by JWrapper☆12Dec 5, 2022Updated 3 years ago
- bypassing the twitter safety link firewall :)☆12May 4, 2025Updated 9 months ago
- A CPU Backdoor. Phrack 72☆15Dec 4, 2025Updated 2 months ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆160Dec 13, 2023Updated 2 years ago
- Security Blogs - A simple aggregator for security news/blog☆24Jan 19, 2026Updated 3 weeks ago
- The rev.ng demos☆13Jan 29, 2026Updated 2 weeks ago
- DROB (Dynamic Rewriter and Optimizer of Binary code)☆26Feb 19, 2020Updated 5 years ago
- Python binary DisAssembler☆25Apr 22, 2015Updated 10 years ago
- Opossum Attack: Application Layer Desynchronization using Opportunistic TLS☆15Jul 28, 2025Updated 6 months ago
- Security issue in the hypervisor firmware of some older Qualcomm chipsets☆38Dec 27, 2022Updated 3 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆13Jan 30, 2023Updated 3 years ago
- ☆17Oct 26, 2021Updated 4 years ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- prebuild angr wheels for Windows on x86_64☆15Jul 21, 2018Updated 7 years ago
- Exploit for Real World CTF 6th RIPTC.☆33Jan 31, 2024Updated 2 years ago
- Reverset is a reverse engineering, and binary analysis tool.☆19Jan 4, 2020Updated 6 years ago
- POC for cve-2019-1458☆21Mar 4, 2020Updated 5 years ago
- A tool to search for gadgets, operations, and ROP chains using a backtracking algorithm in a tree-like structure☆19Jun 13, 2023Updated 2 years ago
- Breaking secure checksums in the scudo heap allocator☆14Apr 9, 2020Updated 5 years ago
- A Python-based programmable static tracing disassembler☆13Jul 26, 2025Updated 6 months ago
- Prediction algorithms for the PCG pseudo-random generator☆14Nov 13, 2020Updated 5 years ago
- Slide of my conference presentations☆14Sep 5, 2024Updated last year
- IDA Pro script to find interesting syscalls and patterns in binaries☆22Oct 18, 2024Updated last year
- ☆13Jan 30, 2025Updated last year
- Repository for a library focused on binary analysis (mainly for Java related bytecodes)☆46Sep 19, 2025Updated 4 months ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆103Jan 31, 2024Updated 2 years ago
- Spectre based on Linear Address Masking☆68Dec 4, 2023Updated 2 years ago
- Android kernel exploitation for CVE-2022-20409☆201Oct 17, 2024Updated last year
- LLEF is a plugin for LLDB to make it more useful for RE and VR☆460Jan 8, 2026Updated last month
- a plugin to calculate complexity of executable's functions☆18May 17, 2022Updated 3 years ago
- reversing mtk-su☆16Mar 4, 2020Updated 5 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Bytecode Analysis Toolkit.☆17Oct 28, 2022Updated 3 years ago
- Collections of patterns for weggli to find nice bugs☆21Nov 30, 2023Updated 2 years ago