Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
☆38Feb 7, 2019Updated 7 years ago
Alternatives and similar repositories for readhook
Users that are interested in readhook are comparing it to the libraries listed below
Sorting:
- tamper resistant audit log☆17Aug 30, 2018Updated 7 years ago
- A SDN project to implement moving target defense☆11Nov 21, 2014Updated 11 years ago
- ☆15Aug 23, 2020Updated 5 years ago
- Support for Geckodriver (Firefox driver) within Appium☆18Feb 16, 2026Updated 2 weeks ago
- hook: linux kernel syscall hijack☆21Dec 28, 2016Updated 9 years ago
- Device Tree For LG K10 (M250)☆10Aug 26, 2017Updated 8 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- ART with modifications for Xposed☆13Sep 4, 2016Updated 9 years ago
- Moved to https://codeberg.org/DNS-OARC/drool☆82Feb 4, 2026Updated 3 weeks ago
- This GitHub repository contains a project that automates the provisioning of a Kubernetes (K8s) cluster using Infrastructure as Code (IaC…☆15Oct 19, 2025Updated 4 months ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Linux tree for ntrdma driver development.☆11Jun 29, 2017Updated 8 years ago
- ☆13Feb 17, 2026Updated last week
- ☆10Mar 13, 2022Updated 3 years ago
- Data Commander is a front-end for SQL and other databases. The program has a plugin architecture for adding arbitrary data providers.☆11Feb 23, 2026Updated last week
- EVEOnlineAPI☆19Jun 3, 2020Updated 5 years ago
- ☆15Feb 18, 2026Updated last week
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 4 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- A Postgres migrations tool with an emphasis on safety and transparency☆10Jun 1, 2021Updated 4 years ago
- A gentle introduction to binary exploitation☆41May 9, 2020Updated 5 years ago
- Bennu Game Development☆11Aug 1, 2022Updated 3 years ago
- TWRP device tree for Moto G8 Plus (doha)☆10May 11, 2020Updated 5 years ago
- This is only a backup for Android SDK Sources for API Level 31 [Android 12].☆12Oct 11, 2021Updated 4 years ago
- Repository for the DPP'23 course☆11May 2, 2024Updated last year
- Apple Pay and Google Pay in a single install. Digital Wallet Payment Orchestration built on a Serverless Stack for AWS using Golang, Node…☆12Oct 12, 2021Updated 4 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- inter-API - OpenBanking Application Implementation Sample☆12May 1, 2023Updated 2 years ago
- Jasmine "lnishan" Chen's Curriculum Vitae (CV) in Markdown☆10May 23, 2018Updated 7 years ago
- Dark Reader Chrome and Firefox extension☆12Jul 7, 2019Updated 6 years ago
- Plugin to assist in reverse engineering programs that use JNI.☆11Apr 27, 2017Updated 8 years ago
- 🧩 Official patches by ReVanced☆12Aug 29, 2022Updated 3 years ago
- A PHP code transformer to provide protection against injection attacks☆10Jul 11, 2011Updated 14 years ago
- Displays interlinear gloss in a more readable way with HTML.☆10Apr 2, 2019Updated 6 years ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 3 years ago
- Try harder to bypass that WAF...☆13Jan 4, 2015Updated 11 years ago
- All crack email (yahoospambox:hotmai) ...... created by mohammad && arman☆10Sep 5, 2020Updated 5 years ago
- A magisk module which can hide IMEI in system prop on Xiaomi devices.☆11May 16, 2022Updated 3 years ago
- DUQU MALWARE SOURCE + BINARY + More coming☆12Feb 6, 2023Updated 3 years ago