enzosaracen / ptpatchView external linksLinks
programmatic binary patching using ptrace
☆13Aug 9, 2025Updated 6 months ago
Alternatives and similar repositories for ptpatch
Users that are interested in ptpatch are comparing it to the libraries listed below
Sorting:
- This is a dataset which contains millions of positions with stockfish evaluations.☆16Jun 14, 2023Updated 2 years ago
- Generate DOM clobbering attack vectors for you.☆35Jun 3, 2025Updated 8 months ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- simple type recognition in decompiled executables☆119Jul 4, 2024Updated last year
- ☆27Apr 27, 2022Updated 3 years ago
- Source for BuckeyeCTF 2022 challenges☆28Nov 7, 2022Updated 3 years ago
- Research paper repository for "A Hand Structure-Based Mobile Authentication Solution to the Security-Reliability Trade-off" Paper from NJ…☆13Jul 30, 2023Updated 2 years ago
- Haptic feedback with an ESP32 by bluetooth for VRChat☆13Dec 3, 2024Updated last year
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Platform for LA CTF. Forked from redpwn/rctf.☆11Feb 6, 2026Updated last week
- Conway's Game of Life but with 3d WebVR cows☆10Nov 10, 2021Updated 4 years ago
- 用於 Java, Design Pattern 的教育學習專案,包含一些 demo code。☆10Nov 29, 2017Updated 8 years ago
- Verilog bit slicing for python☆10May 13, 2021Updated 4 years ago
- Advanced PDF parsing for python☆12Jan 21, 2025Updated last year
- Linux kernel-mode and user-space with wine/MinGW/Windows compability hacking library.☆12Sep 15, 2022Updated 3 years ago
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆22Mar 28, 2025Updated 10 months ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- A C# implementation that disables Windows Firewall bypassing UAC☆17Oct 23, 2024Updated last year
- The home for ACM Cyber at UCLA! Website for the premier cybersecurity club at UCLA.☆12Feb 5, 2026Updated last week
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 2 months ago
- Shadow map rendering engine.☆11Feb 26, 2022Updated 3 years ago
- 在线安软识别☆12Aug 6, 2025Updated 6 months ago
- Install dnscrypt-proxy on Ubuntu 18.04☆10Dec 15, 2018Updated 7 years ago
- ☆15Sep 2, 2024Updated last year
- A small tool to patch PE files' import address table with an external payload DLL.☆14Updated this week
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- adobe reader sandbox utility☆11Aug 7, 2020Updated 5 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 4 months ago
- QEMU escape code☆63Jun 6, 2021Updated 4 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- WebAssembly as a Fuzzing Compilation Target @ FUZZING'24☆18Jan 28, 2026Updated 2 weeks ago
- ☆12Mar 1, 2021Updated 4 years ago
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 3 months ago
- ☆12Mar 15, 2020Updated 5 years ago
- A REALLY Danger Windows Driver, Turn Any threads Ring0!☆13Aug 11, 2025Updated 6 months ago
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- Deadline countdowns for academic conferences relevant to the SSE chair.☆12Updated this week
- Windows command line utility to set Intel FIVR voltage offset.☆13Mar 7, 2021Updated 4 years ago