andikleen / pstrings
strings for a Linux process' address space
☆51Updated 11 years ago
Alternatives and similar repositories for pstrings:
Users that are interested in pstrings are comparing it to the libraries listed below
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 9 years ago
- ☆36Updated 12 years ago
- Collection of scripts for radare2☆28Updated 6 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Updated 10 years ago
- Alternative hexdump.☆15Updated 9 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆78Updated 5 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- trace local function calls like strace and ltrace☆70Updated 8 years ago
- Inject shellcode into running processes in Linux.☆43Updated 9 months ago
- Recon system hardening scanner☆47Updated 8 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- A Genetic File, Syscall and Network Fuzzer.☆58Updated 7 years ago
- Memory awesomeness.☆29Updated 10 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆73Updated 8 years ago
- Precise Code Tracking (Vim)☆32Updated 8 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 6 years ago
- System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)☆46Updated 7 years ago
- ☆38Updated 12 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- Modifies running processes on Linux☆24Updated 2 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆39Updated 6 years ago
- A shellcode testing harness.☆69Updated 9 months ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Updated 8 years ago