Binary exploitation by confusing the unwinder
☆68Mar 9, 2023Updated 3 years ago
Alternatives and similar repositories for chop
Users that are interested in chop are comparing it to the libraries listed below
Sorting:
- Generate a PDB file given the old PDB file and an address mapping☆52Aug 3, 2025Updated 7 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- Kernel Read Write Execute☆84Aug 30, 2024Updated last year
- AArch64 fuzzer based on the Apple Silicon hypervisor☆196Nov 23, 2023Updated 2 years ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆469Apr 13, 2024Updated last year
- Use Ghidra Structs in Python☆30Mar 28, 2021Updated 4 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91May 12, 2022Updated 3 years ago
- WTF Snapshot fuzzing of macOS targets☆98May 31, 2024Updated last year
- ☆20Jun 13, 2022Updated 3 years ago
- ☆16Sep 29, 2022Updated 3 years ago
- Official Solution and Source Code for the "Mock Kernel" challenge from UIUCTF 2023☆49Jul 11, 2023Updated 2 years ago
- AFLTeam Collaborative Parallel Fuzzing☆75Sep 5, 2022Updated 3 years ago
- ASLR bypass without infoleak☆168Nov 2, 2021Updated 4 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- ☆81Sep 7, 2023Updated 2 years ago
- A simple hypervisor demonstrating the use of the Intel VT-rp (redirect protection) technology.☆114Mar 28, 2024Updated last year
- A tool combining DWARF info and source to search for kernel heap objects☆24Dec 23, 2025Updated 2 months ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆249Jul 5, 2022Updated 3 years ago
- ☆21Jan 28, 2020Updated 6 years ago
- ☆39Sep 27, 2022Updated 3 years ago
- Working Set Page Cache side-channel IPC PoC☆68Jan 9, 2019Updated 7 years ago
- ☆24Apr 30, 2023Updated 2 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- ☆42Aug 4, 2020Updated 5 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- A proof-of-concept for CVE-2020-12753☆45Jun 1, 2020Updated 5 years ago
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆34Apr 22, 2024Updated last year
- An AVX Lifter for the Hex-Rays Decompiler☆333Apr 28, 2023Updated 2 years ago
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago
- CVE-2021-4154 exploit☆67Oct 7, 2022Updated 3 years ago
- A collection of LLVM transform and analysis passes to write shellcode in regular C☆381Jun 12, 2023Updated 2 years ago
- An IOKit kext designed for microarchitectural security research on M1☆46Oct 30, 2022Updated 3 years ago
- Radamsa fuzzer ported to rust lang☆157Mar 14, 2025Updated 11 months ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆145Mar 29, 2021Updated 4 years ago
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated last month
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Jan 16, 2026Updated last month
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆12Jan 19, 2024Updated 2 years ago