☆92Dec 23, 2017Updated 8 years ago
Alternatives and similar repositories for grlh
Users that are interested in grlh are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆17Oct 19, 2020Updated 5 years ago
- Shim to grab keystore backed data☆27Sep 21, 2017Updated 8 years ago
- ☆161Oct 2, 2025Updated 6 months ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ctfwriteup☆25Mar 27, 2019Updated 7 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Dec 31, 2018Updated 7 years ago
- AFL with QEMU 3.1.0 + optimizations (thread safe this time) from https://github.com/abiondo/afl☆10Mar 12, 2019Updated 7 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Apr 25, 2013Updated 12 years ago
- Misc PoCs for various research topics☆21Sep 28, 2022Updated 3 years ago
- fuzz testing framework for Linux system calls☆12Sep 4, 2015Updated 10 years ago
- ☆32Nov 15, 2017Updated 8 years ago
- A framework for parsing binary data.☆18Aug 12, 2022Updated 3 years ago
- Unofficial forward ports of the last publicly available grsecurity patch☆152Aug 10, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Nov 2, 2019Updated 6 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆102Nov 24, 2019Updated 6 years ago
- A tool to find gadgets in the iOS kernelcache.☆33Jun 20, 2018Updated 7 years ago
- ☆18Jan 20, 2020Updated 6 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Apr 18, 2019Updated 6 years ago
- VirtualBox 3D exploits & PoCs☆163Jan 24, 2019Updated 7 years ago
- Get symbol address and name from tables for kallsyms☆33Apr 4, 2016Updated 10 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆59Mar 18, 2015Updated 11 years ago
- ☆96Jul 10, 2018Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆82Dec 5, 2018Updated 7 years ago
- Exploit Android MSM8974 Chipset☆14Aug 20, 2015Updated 10 years ago
- A set of exploitation/reversing aids for IDA☆421Nov 28, 2017Updated 8 years ago
- encrypted-linux-kernel-modules☆12Nov 4, 2020Updated 5 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- Python bindings for calling radamsa mutators☆27Feb 21, 2026Updated last month
- PoC exploit for CVE-2016-4622☆109Sep 18, 2023Updated 2 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆75May 21, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Android privilege escalation via an use-after-free in binder.c☆41Apr 14, 2020Updated 5 years ago
- Recon materials☆26Nov 18, 2017Updated 8 years ago
- A linux system call fuzzer using TriforceAFL☆177Feb 28, 2024Updated 2 years ago
- practice☆69Mar 19, 2020Updated 6 years ago
- Reexport symbols for Mach-O and ELF☆38Mar 2, 2018Updated 8 years ago
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 8 years ago
- Linux bind shell with anti-reverse engineering techniques☆292Feb 9, 2017Updated 9 years ago