A tool to resolve seccomp just like seccomp-tools, written in C
☆74Feb 23, 2026Updated last week
Alternatives and similar repositories for Ceccomp
Users that are interested in Ceccomp are comparing it to the libraries listed below
Sorting:
- A simple tool helps CTFpwner deal with protobuf ELF, reverses proto structure and generates ".proto" files.☆19May 12, 2025Updated 9 months ago
- CTF platform we wrote and used for justCTF 2019☆12Jun 25, 2022Updated 3 years ago
- choose demo☆21Nov 6, 2025Updated 3 months ago
- Templates for deploying pwn challenge in ctf☆51Mar 24, 2023Updated 2 years ago
- A Cython reverse helper with analyzing Ghidra P-Code. For 2024 CTFCON.☆11Aug 16, 2024Updated last year
- Code for "Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA"☆16Oct 8, 2025Updated 4 months ago
- Symbolic execution engine for Whitespace.☆13May 30, 2021Updated 4 years ago
- Implementation of cryptographic attacks. Mainly reproduction of recent cryptographic papers.☆15Dec 4, 2024Updated last year
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- pwn writeups in ctf☆16Jan 28, 2026Updated last month
- ida pro theme☆14Aug 20, 2018Updated 7 years ago
- Debug pwn using docker image☆148Mar 9, 2025Updated 11 months ago
- Python Bytecode Obfuscation☆14Aug 21, 2023Updated 2 years ago
- Emulation Wrapper Solution is a IDA Pro plugin that brings emulator capacities to provide features such as debugging an mocking.☆23May 25, 2023Updated 2 years ago
- Automatic use of House of Some & House of Illusion.☆84Sep 9, 2025Updated 5 months ago
- ☆15Mar 14, 2023Updated 2 years ago
- CTF challs and writeups from CNSS.☆18Feb 15, 2020Updated 6 years ago
- Predict and Backtrack MT19937 PRNG by putting 32 * 624 bits generated numbers. Python "random" standard library uses mt19937, so we can …☆40Dec 20, 2022Updated 3 years ago
- Il2Cpp Dumper for Unity Android games built on LSPosed + Dobby, with cross-process config sync and one-tap dump.☆53Dec 12, 2025Updated 2 months ago
- 开源apk逆向一体化分析工具☆37Feb 7, 2026Updated 3 weeks ago
- Nonce reuse attacks for AEAD ciphers, especially for the the most commonly used `ChaCha20-Poly1305` and `AES-GCM`.☆22Nov 7, 2024Updated last year
- tcpw: An eBPF enhanced tool to capture tcp tuple info of curl,telnet,socat tools. License Apache 2.0☆24Dec 22, 2024Updated last year
- Pwn 比赛小工具☆32Dec 27, 2025Updated 2 months ago
- Attacking ECDSA with nonce leakage using lattice-based algorithms☆43Nov 19, 2025Updated 3 months ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- A JADX plugin for interactive code analysis using Large Language Models (LLMs). Provides dynamic code analysis, security assessment, malw…☆28Dec 14, 2024Updated last year
- 一个通过控制指定内存段权限设置而实现阻止app自身inline hook行为的内核模块☆39Mar 13, 2025Updated 11 months ago
- 反ida内联汇编花指令☆54Jul 3, 2023Updated 2 years ago
- A customized debug tool☆21Nov 20, 2024Updated last year
- android jni trace for arm64 for magisk module!☆90Nov 28, 2025Updated 3 months ago
- cracker for the llvm-fla-obfuscator☆24Sep 6, 2016Updated 9 years ago
- 无痕hook探测☆45Aug 6, 2025Updated 6 months ago
- Solana Virtual Machine bytecode processor for IDA Pro☆76Feb 19, 2025Updated last year
- AIPromptJailbreakPractice - AI Prompt 越狱实例☆55Dec 16, 2024Updated last year
- z3 solver 学习☆53Jun 17, 2023Updated 2 years ago
- StegSolve-rs 是一个基于 Rust + egui 重构的图像隐写分析工具,复刻重构了StegSolve☆67Oct 21, 2025Updated 4 months ago
- This lab guides you through setting up an environment to explore CVE-2019-2215, a critical Android kernel vulnerability in the binder sub…☆40Apr 24, 2025Updated 10 months ago
- ☆25Feb 23, 2022Updated 4 years ago
- Some common reverse exps in CTF.自己总结编写的一些逆向常用脚本&&常见加密/编码的实现源码和比赛时用的处理脚本。☆34Jan 9, 2024Updated 2 years ago