Dive into ELF files using simple self-contained examples
☆153Aug 30, 2015Updated 10 years ago
Alternatives and similar repositories for ElfHacks
Users that are interested in ElfHacks are comparing it to the libraries listed below
Sorting:
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- A collection of more than 1000 binary libc files☆90Mar 26, 2015Updated 10 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- A simple tool to help you capture Ioctls.☆20Aug 26, 2017Updated 8 years ago
- write-what-where plus heap address leaking in OMX☆36Dec 8, 2015Updated 10 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆58Jan 5, 2019Updated 7 years ago
- Configurable, flexible regex-based APK modification tool.☆37Jun 26, 2017Updated 8 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 10 years ago
- Improvised json-based configurable Windows sandbox☆11Sep 29, 2020Updated 5 years ago
- Today Plugin (x64) - A Plugin For x64dbg☆13Jul 17, 2018Updated 7 years ago
- cve2014-3153 exploit for ubuntu x86☆18Jan 24, 2015Updated 11 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Aug 23, 2017Updated 8 years ago
- Windows Kernel Dump Analyzer☆15May 9, 2015Updated 10 years ago
- Monitor adapter, Fake DNS, Tunnel, and DHCP combined into one Windows Service☆12Apr 19, 2015Updated 10 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Jul 25, 2014Updated 11 years ago
- Windows aero overlay with Direct2D & DirectWrite support☆11May 1, 2016Updated 9 years ago
- PE rebuilder, based on yoda's realigndll☆12Oct 1, 2011Updated 14 years ago
- Just another tool to download specify Symbol (.pdb) files☆39Sep 4, 2019Updated 6 years ago
- PoC code for android RCE with multidex and ZIP files☆40Feb 1, 2016Updated 10 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- TLB splitting module for the Bareflank Hypervisor.☆12Sep 23, 2018Updated 7 years ago
- IDA2PAT_Reloaded for windows and mac osx☆13Sep 28, 2017Updated 8 years ago
- Open-Source Anti-RMT-Spam Firewall☆12Mar 28, 2016Updated 9 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆29Jul 1, 2013Updated 12 years ago
- Expression generator for WebAssembly☆18Jul 6, 2018Updated 7 years ago
- Android kernel module to bypass SELinux at boot☆44Apr 10, 2016Updated 9 years ago
- Python concolic execution framework for program analysis☆68Nov 13, 2014Updated 11 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- Gain privileges:system -> root,as a part of https://github.com/retme7/CVE-2014-7911_poc☆93Jan 27, 2015Updated 11 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Oct 23, 2014Updated 11 years ago
- UEFI SLIC injector alternate method☆20Oct 9, 2016Updated 9 years ago
- An ELF parsing and manipulation library for Python☆74Oct 24, 2014Updated 11 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- WIP - Play with Intel VM Extensions☆23Jun 12, 2017Updated 8 years ago