andikleen / pstrings
strings for a Linux process' address space
☆51Updated 11 years ago
Alternatives and similar repositories for pstrings:
Users that are interested in pstrings are comparing it to the libraries listed below
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Alternative hexdump.☆15Updated 9 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- ☆36Updated 12 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆78Updated 5 years ago
- trace local function calls like strace and ltrace☆70Updated 8 years ago
- Inject code into a running process☆116Updated 3 years ago
- Inject shellcode into running processes in Linux.☆44Updated 8 months ago
- Collection of somewhat useful stuff for CTF events☆36Updated 9 years ago
- ☆9Updated 7 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago
- Statically linked Library detector☆70Updated 10 years ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Updated 8 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆25Updated 9 years ago
- Modifies running processes on Linux☆24Updated 2 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆73Updated 8 years ago
- Collection of scripts for radare2☆28Updated 6 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- LibreSSL with a backdoor in RSA key generation☆16Updated 8 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 7 years ago
- Current development for Call Map takes place at https://github.com/ajylee/call_map. Call Map is a tool for navigating Python call graphs.…☆28Updated 3 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- A shellcode testing harness.☆69Updated 8 months ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 6 years ago