Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
☆38Feb 7, 2019Updated 7 years ago
Alternatives and similar repositories for readhook
Users that are interested in readhook are comparing it to the libraries listed below
Sorting:
- Some of the Anti-Debugging Tricks☆29Feb 20, 2017Updated 9 years ago
- A command line Swiss army knife for string and number conversions☆18Feb 27, 2026Updated 3 weeks ago
- Support for Geckodriver (Firefox driver) within Appium☆18Updated this week
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- tamper resistant audit log☆17Aug 30, 2018Updated 7 years ago
- Runpe + DInvoke + Syscall☆16Jun 18, 2021Updated 4 years ago
- API logger plugin for Intel Pintool☆14Nov 19, 2017Updated 8 years ago
- POC for cve-2019-1458☆21Mar 4, 2020Updated 6 years ago
- Classical Pong game written in BootSector (512byte) nasm intel 8086 assembly☆11Jul 12, 2024Updated last year
- hook: linux kernel syscall hijack☆21Dec 28, 2016Updated 9 years ago
- Prebuilt kernels with kamakiri-usb patch applied☆22Feb 19, 2021Updated 5 years ago
- Porting Windows Dynamic Link Libraries to Linux☆20Jun 11, 2025Updated 9 months ago
- Windows driver uitls☆17Dec 8, 2014Updated 11 years ago
- Library to manipulate CSP reports and policies☆15Apr 18, 2014Updated 11 years ago
- android-inject-hook☆15Feb 8, 2018Updated 8 years ago
- Awesome Super Mario: mini mario-like in assembly language☆10Sep 11, 2015Updated 10 years ago
- Rust procedural macro to insert a few asm! calls full of junk instructions in between every line of code.☆13May 27, 2023Updated 2 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆13Feb 6, 2023Updated 3 years ago
- Plugin to assist in reverse engineering programs that use JNI.☆12Apr 27, 2017Updated 8 years ago
- Beacon Object File allowing creation of Beacons in different sessions.☆83May 23, 2022Updated 3 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated last year
- Allows IDA PRO to disassemble x86-64 code (WOW64) in 32-bit database☆27Dec 27, 2021Updated 4 years ago
- AdminX it's a Malware to execute process as some users from a Windows OS☆11May 4, 2023Updated 2 years ago
- A green colorscheme for Vim text editor.☆16Feb 25, 2018Updated 8 years ago
- IDA loader module for Hidden Bee's custom executable file format☆20Sep 2, 2018Updated 7 years ago
- Alina POS Source Code + Rootkit☆23Nov 3, 2015Updated 10 years ago
- An open source, embedded, high performance g-code-parser and CNC milling controller written in optimized C that will run on a straight Ar…☆10Jan 7, 2016Updated 10 years ago
- Electron symbol server☆24Nov 23, 2025Updated 3 months ago
- Security scanner tool for Plone CMS.☆19May 14, 2012Updated 13 years ago
- Simple KiCad project for artistic PCB ornaments☆11Dec 16, 2018Updated 7 years ago
- Deep learning side channel privileged memory reader☆45Jun 28, 2018Updated 7 years ago
- Dotfiles for my personal computer!☆16May 17, 2021Updated 4 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Aug 6, 2018Updated 7 years ago
- Awesome Hardware Development CheatSheet☆16Aug 30, 2017Updated 8 years ago
- C source for ham radio project: A 5 band QRP SSB transcevier for 3.5, 7, 14, 18 and 21 MHz.☆11Oct 27, 2020Updated 5 years ago
- Last Writer Slicing: data provenance tracking for concurrent program debugging & analysis☆13Nov 14, 2014Updated 11 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- Set up your own CTF with NIZKCTF☆14Oct 20, 2017Updated 8 years ago
- Basic script for monitoring new posts on Pastebin for keywords☆12Nov 27, 2016Updated 9 years ago