citypw / citypw-SCFELinks
sample code for educate myself-_-
☆43Updated 9 years ago
Alternatives and similar repositories for citypw-SCFE
Users that are interested in citypw-SCFE are comparing it to the libraries listed below
Sorting:
- Slides, codes and videos of the talk "DEP/ASLR bypass without ROP/JIT" on CanSecWest 2013☆49Updated 12 years ago
- Some kernel exploit i wrote☆76Updated 10 years ago
- Hardened PoC: PaX for Android☆38Updated 4 years ago
- Fuzz testing framework for security research☆30Updated 11 years ago
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆68Updated 11 years ago
- HexPADS, a host-based, Performance-counter-based Attack Detection System☆39Updated 2 years ago
- ☆51Updated 8 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- PEDA - Python Exploit Development Assistance for GDB☆19Updated 7 years ago
- Libnids is an implementation of an E-component of Network Intrusion Detection System. It emulates the IP stack of Linux 2.0.x. Libnids of…☆53Updated 9 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆68Updated 11 years ago
- Re-randomizing the memory layout of a process at runtime☆21Updated 9 years ago
- Fork from http://redmine.poppopret.org/projects/suterusu. An LKM rootkit targeting Linux 2.6/3.x on x86 and ARM. Supports privilege esca…☆33Updated 12 years ago
- ☆28Updated 2 years ago
- hardenedlinux.org website☆32Updated last month
- ☆38Updated 12 years ago
- Windows Kernel Dump Analyzer☆15Updated 10 years ago
- Adobe Flash Player File Instrumentation Tool For Security Research☆86Updated 2 years ago
- Virtual Machine Introspection (VMI) project☆15Updated 10 years ago
- ☆49Updated 8 years ago
- ☆92Updated 10 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- A Linux kernel module that locates the system call table in memory and hooks uname. Contributions welcome!☆58Updated 12 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- Various presentations and related materials☆7Updated 9 years ago
- Dynamic instrumentation of the Linux kernel☆40Updated 10 years ago
- cve-2014-4323 poc☆24Updated 9 years ago
- ☆23Updated 10 years ago
- ld-linux code injector☆49Updated 13 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 8 years ago