Collection of RISC-V exploits
☆33Nov 10, 2019Updated 6 years ago
Alternatives and similar repositories for riscv_exploitation
Users that are interested in riscv_exploitation are comparing it to the libraries listed below
Sorting:
- Show syscall information for different architectures☆15Aug 26, 2017Updated 8 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- Python script to find subdomains☆11Aug 22, 2025Updated 6 months ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆24Jun 22, 2018Updated 7 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- ☆12Jul 27, 2017Updated 8 years ago
- A python library to find one-gadget☆31Feb 22, 2019Updated 7 years ago
- Crypt::Curve25519☆12Jan 6, 2021Updated 5 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆74May 19, 2017Updated 8 years ago
- Repository used to play with Containerlab.☆11Jan 19, 2022Updated 4 years ago
- please use https://github.com/fireeye/vivisect instead☆16Oct 21, 2025Updated 5 months ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- little kernel (lk) bootloader for Qualcomm MSM8953 devices☆13Sep 4, 2020Updated 5 years ago
- Literally does the opposite of Ciphey. Encrypts text.☆11Feb 25, 2021Updated 5 years ago
- A C++ memory context☆11Jul 28, 2021Updated 4 years ago
- A Basic BBI Tool - So Simple, But So Good!☆32Dec 13, 2021Updated 4 years ago
- A collection of steganography tools.☆15Nov 2, 2020Updated 5 years ago
- Perl wrapper for the capstone library☆13Mar 7, 2017Updated 9 years ago
- ☆14Sep 2, 2020Updated 5 years ago
- RISC-V Soft CPU Security Contest by Thales and Microchip Technology☆12Jul 29, 2019Updated 6 years ago
- Adding trace to DesignStart for easier side-channel analysis on the CW305 target. Also supports PhyWhisperer.☆17Feb 19, 2025Updated last year
- Check Diffie Hellman group prime parameter☆11Jan 29, 2016Updated 10 years ago
- Define and generate waveforms to output with your favorite DAC☆12Jan 2, 2019Updated 7 years ago
- Parallel ssdeep clustering kit☆20Dec 24, 2017Updated 8 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- ☆14Aug 28, 2023Updated 2 years ago
- ☆13Aug 26, 2021Updated 4 years ago
- The yaml documents for the CTFman search system.☆12May 16, 2019Updated 6 years ago
- Merke tree visualization library for browser, works with merkletreejs☆24Nov 18, 2022Updated 3 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- Forked from http://git.osmocom.org/osmo-fl2k . Turns FL2000-based USB 3.0 to VGA adapters into low cost DACs.☆16Jan 27, 2021Updated 5 years ago
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆22Mar 5, 2024Updated 2 years ago
- pwntools library implementation in c++☆49Apr 11, 2021Updated 4 years ago
- Collection of Web3 Audits and Publications by ChainLight of Theori☆14Oct 30, 2023Updated 2 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- iOS 11.3.1 exploit☆48Dec 26, 2018Updated 7 years ago
- One-Click to Completely Take Over A macOS Device☆18Aug 25, 2022Updated 3 years ago