citronneur / blindsslLinks
Disable SSL certificate verification for all binaries that use libssl
☆49Updated 3 years ago
Alternatives and similar repositories for blindssl
Users that are interested in blindssl are comparing it to the libraries listed below
Sorting:
- Dectect syscall hooking using eBPF☆161Updated 2 years ago
- POC for Phantom Attack☆83Updated 3 years ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆165Updated last year
- PPT of my talks.☆11Updated 2 months ago
- Example program using eBPF to log data being based in using shell pipes☆41Updated 4 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆42Updated 4 years ago
- Tools to bypass flawed SELinux policies using the init_module system call☆58Updated last year
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- ☆33Updated 8 months ago
- LD_PRELOAD library to bypass TLS certificate verification for debugging and testing☆25Updated 3 weeks ago
- Proof of concept code for CVE-2023-2008☆41Updated 2 years ago
- ☆14Updated 2 years ago
- IDA (sort of) headless☆25Updated last year
- TrustZone Trusted Application 0-Days by Design☆24Updated 4 months ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Log data to/from SSL_write/SSL_read to disk using LD_PRELOAD hooks☆90Updated 5 years ago
- ☆89Updated last year
- Linux Kernel N-day Exploit/Analysis.☆67Updated 10 months ago
- This repository contains multiple exploits I have written for various CVEs and CTFs☆28Updated last month
- ☆79Updated 6 months ago
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆31Updated 2 years ago
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- IDA Database Importer plugin for Binary Ninja☆37Updated last year
- ☆13Updated 10 months ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42Updated 2 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- ☆19Updated 3 years ago
- ☆131Updated 4 months ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago