c3r34lk1ll3r / gdb_2_rootView external linksLinks
This python script adds some usefull command to stripped vmlinux image
☆24Sep 18, 2020Updated 5 years ago
Alternatives and similar repositories for gdb_2_root
Users that are interested in gdb_2_root are comparing it to the libraries listed below
Sorting:
- Palantir is a Lua scriptable, portable, tiny reverse shell, using a human readable protocol written in C and Lua.☆18Mar 19, 2018Updated 7 years ago
- LPE of CVE-2024-26230☆23Sep 1, 2024Updated last year
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- A library for patching ELFs☆62Dec 4, 2020Updated 5 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Jul 12, 2020Updated 5 years ago
- ☆30Jan 30, 2021Updated 5 years ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30May 12, 2013Updated 12 years ago
- A collection of Writeups and Papers about iOS Security☆29Apr 11, 2018Updated 7 years ago
- PCIDriverKit proof-of-concept for CVE-2022-26763☆37Jul 2, 2022Updated 3 years ago
- ☆15Sep 4, 2024Updated last year
- A dynamic analysis platform for Android☆44Jul 9, 2019Updated 6 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆41Oct 19, 2020Updated 5 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆91Nov 16, 2021Updated 4 years ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Nov 2, 2023Updated 2 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Oct 31, 2021Updated 4 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- 🚧 ✨ This package will help you create and build resume templates. 💯 It has simple and basic functionalities. But remains quite customiz…☆11Apr 23, 2024Updated last year
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆33Jan 27, 2026Updated 2 weeks ago
- A Benchmark for Evaluating Safety and Trustworthiness in Web Agents for Enterprise Scenarios☆17Feb 8, 2026Updated last week
- JXA script to allow programmatic persistence via macOS Calendar.app alerts.☆44Oct 31, 2020Updated 5 years ago
- A server and client implementation to demonstrate and test ALG abuse and perform the NAT slipstream attack described https://www.samy.pl/…☆43Dec 8, 2020Updated 5 years ago
- ☆11Mar 26, 2018Updated 7 years ago
- A practical fuzzing tool for SMT solvers☆11Nov 26, 2025Updated 2 months ago
- 我的演讲 ppt or pdf 归档库☆10Mar 28, 2021Updated 4 years ago
- ☆16Dec 7, 2025Updated 2 months ago
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 7 months ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated 10 months ago
- A simple screengrabber live viewer for the Onyx Boox Note Air EInk Tablet☆11Jan 12, 2021Updated 5 years ago
- kernel exploit POC for vulnerability i found in amd gpu driver☆11Jan 6, 2023Updated 3 years ago
- Best practice configuration for Linux auditd for CIS and STIG standards, enhanced with LOTL detection rules.☆14Dec 6, 2025Updated 2 months ago
- Keep a local IMAP mirror, painlessly☆15Nov 6, 2021Updated 4 years ago
- ☆12Jun 14, 2017Updated 8 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- funky fun fuzzer☆11Jul 6, 2021Updated 4 years ago
- Automate TikTok logins effortlessly using Selenium or Playwright! Solve captchas seamlessly with the ocacaptcha library and streamline yo…☆17Jan 1, 2026Updated last month
- Dynamic-Static binary instrumentation framework on top of GDB☆50Sep 25, 2023Updated 2 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago