crifan / explore_underlying_mechanism_binary_securityLinks
探究底层机制:二进制安全
☆32Updated last year
Alternatives and similar repositories for explore_underlying_mechanism_binary_security
Users that are interested in explore_underlying_mechanism_binary_security are comparing it to the libraries listed below
Sorting:
- 利用github action定时爬取先知、安全客等的文章进行保存☆63Updated 3 years ago
- 林中有两条路,我选择了人迹罕至的一条☆32Updated 3 years ago
- IDA Pro每周小技巧☆277Updated 2 years ago
- IDA7.6/IDA7.7 + Python3 下,Go 可执行文件的符号恢复脚本。已适配 Go1.2/Go1.16/Go1.18/Go1.20☆31Updated 9 months ago
- Linux下应用层注入/hook技术实现端口复用☆1Updated 4 years ago
- Windows安全研究工具包☆30Updated 3 years ago
- Collect some security conference topics☆50Updated last year
- ☆84Updated 3 years ago
- 容器安全漏洞的分析与复现☆159Updated last year
- 安全大佬 Top 100☆68Updated 3 years ago
- ☆52Updated 3 years ago
- This is a Cheatsheet for CTF Challenges categorized by different Privilege Escalation Methods☆25Updated 5 years ago
- 一个基于LKM的Linux内核级rootkit的实现,包含模块隐藏、提权、文件隐藏、进程隐藏、端口隐藏功能☆102Updated last year
- 三叶草技术小组二进制方向2021年第二次面试题目 & 题解☆14Updated 3 years ago
- Here is Hacking-Group-0872-Slide☆32Updated last year
- ☆25Updated 2 years ago
- 基于Xposed和Frida的隐私检测工具,Gui界面呈现检测结果☆42Updated last year
- WPS 0day.hen the wps software is running, an api interface with port 4709 will be opened. An attacker can request this interface to execu…☆97Updated 11 months ago
- 个人整理的Android安全学习笔记☆73Updated 6 years ago
- DHook是一个支持动态debug,动态修改java程序的web应用.☆87Updated 8 months ago
- linux kernel internals research details☆45Updated last year
- ☆9Updated 3 years ago
- 我的一些安全订阅☆54Updated 4 years ago
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Updated 2 years ago
- 各种乱七八糟的收集, 51pwn.com大数据平台模糊查询☆61Updated last year
- 绿色灵活,路 径无关,插件自由,即改即用,所见即所得。助你轻松记录灵感,沉淀知识,并快速复用。☆35Updated 2 months ago
- 二进制安全高级参考资料☆121Updated 5 years ago
- 一些自己打比赛的捣蛋脚本☆50Updated 4 years ago
- ☆14Updated last year
- The demo of hidden process and ko module☆21Updated 2 years ago