GEF - GDB Enhanced Features for exploit devs & reversers
☆27Mar 9, 2024Updated 2 years ago
Alternatives and similar repositories for gef-kernel
Users that are interested in gef-kernel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pwntools Extension with No Extra Effort!☆15Jun 29, 2025Updated 8 months ago
- basic amd64 alphanumeric shellcode encoder☆203Jan 15, 2024Updated 2 years ago
- Page-Oriented Programming (POP) Tools for Black Hat USA 2023 and USENIX security 2024☆60Aug 7, 2024Updated last year
- ☆23Jan 9, 2023Updated 3 years ago
- Chinese mirror of Tryhackme tutorials☆16Dec 11, 2025Updated 3 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- [ICSE'25] Specialized Fuzzing for LLVM Backend Code Generation☆21Mar 26, 2025Updated 11 months ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 3 months ago
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- ☆10Mar 10, 2026Updated 2 weeks ago
- crifan的折腾精神、学习能力和逻辑能力的体现☆11Oct 28, 2022Updated 3 years ago
- SLOT: SMT-LLVM Optimizing Translation☆62Apr 17, 2025Updated 11 months ago
- Some basic info, resources, and code snippets about windows kernel exploitation☆17Jul 18, 2025Updated 8 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- jqctf2023☆16Dec 3, 2023Updated 2 years ago
- Quick pwn environment setup from Ubuntu16.04 to Ubuntu 24.04. STOP WASTING YOUR TIME ON ENV SETUP.☆11May 16, 2025Updated 10 months ago
- ☆28Dec 10, 2025Updated 3 months ago
- ☆42Sep 18, 2025Updated 6 months ago
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- ☆20Oct 24, 2024Updated last year
- Chip'olino - hardware & software platform for research in the field "Power Attacks"☆55Aug 26, 2025Updated 6 months ago
- Code repository for the research paper "A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP"☆13May 17, 2022Updated 3 years ago
- web ctf edu challs☆12Oct 15, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A collection of in-depth studies authored by me on JavaScript engine vulnerabilities.☆50Feb 6, 2026Updated last month
- An approximate solver for concolic execution☆22Apr 29, 2025Updated 10 months ago
- is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)☆13Oct 3, 2024Updated last year
- Exploit scripts for ctf challenges that involves linux kernel pwning☆17Dec 10, 2024Updated last year
- ☆13Jan 7, 2021Updated 5 years ago
- Port of zentool to Windows☆27Mar 7, 2025Updated last year
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆92May 12, 2022Updated 3 years ago
- Binary Ninja plugin that can be used to apply Triton's dead store eliminitation pass on basic blocks or functions.☆64Jul 17, 2024Updated last year
- A fast and powerful gadget finder and ROP chain generator. A research prototype for the ropbot paper accepted at NDSS'26.☆48Jan 22, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Tutorial for writing an LLVM backend☆31May 19, 2025Updated 10 months ago
- Cryptographic services library☆42Oct 8, 2018Updated 7 years ago
- Symbolic execution of LLVM IR traces for program understanding.☆27Feb 24, 2014Updated 12 years ago
- Higher level programming in C☆10May 10, 2014Updated 11 years ago
- challenges 2024 woohoo☆22Sep 19, 2024Updated last year
- A tool to initialize pwn game exploit enviroment.☆44Nov 27, 2025Updated 3 months ago
- 🚩 framework for kernel memory exploitation (WIP)☆22Jul 22, 2025Updated 8 months ago