dbgbgtf1 / CeccompLinks
A tool to resolve seccomp just like seccomp-tools, written in C
☆47Updated this week
Alternatives and similar repositories for Ceccomp
Users that are interested in Ceccomp are comparing it to the libraries listed below
Sorting:
- Automatic use of House of Some & House of Illusion.☆83Updated 4 months ago
- ☆56Updated 3 years ago
- A simple tool helps CTFpwner deal with protobuf ELF, reverses proto structure and generates ".proto" files.☆19Updated 8 months ago
- Small rust binary analysis helper for IDA.☆92Updated last year
- Templates for deploying pwn challenge in ctf☆49Updated 2 years ago
- basic amd64 alphanumeric shellcode encoder☆199Updated 2 years ago
- Muti-threading version of Finger☆32Updated last year
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Updated 6 months ago
- A plugin to resolve .plt.sec symbols in IDA☆79Updated 5 years ago
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Updated 2 years ago
- ☆24Updated 3 years ago
- Angr CTF From introduction to mastery☆153Updated 7 months ago
- A tool to initialize pwn game exploit enviroment.☆42Updated last month
- Archive of AAA CTF 2023 (XCTF competition)☆37Updated 2 years ago
- ☆54Updated 3 years ago
- eastXueLian's reservoir of CTF puzzles.☆15Updated last year
- a GDB plug-in for inspecting mallocng☆59Updated last year
- ☆130Updated last year
- Official repository containing files related to N1CTF 2022☆44Updated 3 years ago
- a simple method to get v8 source code with github action☆77Updated 2 years ago
- xiaomi lua anti☆33Updated 5 years ago
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆93Updated 2 years ago
- ☆124Updated last year
- Archive of AAA CTF 2022 (XCTF competition)☆78Updated last year
- Automatically exported from code.google.com/p/alpha3☆56Updated 5 years ago
- SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.☆174Updated last year
- 修复停止维护的Vxhunter IDA插件项目在python3高些的版本下运行的若干问题☆14Updated last year
- Debug pwn in docker, no need for virtual machines☆38Updated 3 months ago
- Linux kernel privilege escalation techniques☆151Updated last year
- jqctf2023☆16Updated 2 years ago