☆92Dec 23, 2017Updated 8 years ago
Alternatives and similar repositories for grlh
Users that are interested in grlh are comparing it to the libraries listed below
Sorting:
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- Shim to grab keystore backed data☆27Sep 21, 2017Updated 8 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- ☆32Nov 15, 2017Updated 8 years ago
- AFL with QEMU 3.1.0 + optimizations (thread safe this time) from https://github.com/abiondo/afl☆10Mar 12, 2019Updated 6 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Dec 31, 2018Updated 7 years ago
- Testing Intermediate Representations for Binary Analysis (ASE '17)☆82Dec 5, 2018Updated 7 years ago
- ☆163Oct 2, 2025Updated 5 months ago
- Simulate afl-fuzz☆16Aug 1, 2019Updated 6 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Oct 11, 2017Updated 8 years ago
- Exploit Android MSM8974 Chipset☆13Aug 20, 2015Updated 10 years ago
- Unofficial forward ports of the last publicly available grsecurity patch☆152Aug 10, 2018Updated 7 years ago
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆17Oct 19, 2020Updated 5 years ago
- Android privilege escalation via an use-after-free in binder.c☆39Apr 14, 2020Updated 5 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Apr 18, 2019Updated 6 years ago
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Apr 25, 2013Updated 12 years ago
- This is the code for the tutorial/book named Writing Netfilter Modules☆21Dec 1, 2023Updated 2 years ago
- ctfwriteup☆25Mar 27, 2019Updated 6 years ago
- Recon materials☆27Nov 18, 2017Updated 8 years ago
- Linux bind shell with anti-reverse engineering techniques☆291Feb 9, 2017Updated 9 years ago
- A tool to find gadgets in the iOS kernelcache.☆33Jun 20, 2018Updated 7 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆75May 21, 2021Updated 4 years ago
- A set of exploitation/reversing aids for IDA☆421Nov 28, 2017Updated 8 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- Reexport symbols for Mach-O and ELF☆38Mar 2, 2018Updated 8 years ago
- ☆190Oct 25, 2017Updated 8 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- ☆19Mar 24, 2017Updated 8 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- ☆96Jul 10, 2018Updated 7 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Sep 21, 2017Updated 8 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- Linux Kernel Source Tree Reducer☆81Oct 29, 2024Updated last year
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆188Jun 24, 2019Updated 6 years ago
- PoC exploit for CVE-2016-4622☆109Sep 18, 2023Updated 2 years ago
- Misc PoCs for various research topics☆21Sep 28, 2022Updated 3 years ago
- A simple tool to find offsets needed in 32bit jailbreaks. Feel free to contribute.☆31Sep 1, 2017Updated 8 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 7 years ago