gdbinit / can_I_suidView external linksLinks
A TrustedBSD module to control execution of binaries with suid bit set
☆38Oct 3, 2014Updated 11 years ago
Alternatives and similar repositories for can_I_suid
Users that are interested in can_I_suid are comparing it to the libraries listed below
Sorting:
- Small util to dump the IDT table of a running OS X system with kmem enabled☆21May 5, 2014Updated 11 years ago
- Sample code for macOS Extensions Part 3☆24Feb 20, 2020Updated 5 years ago
- Small util to discover OS X sysent via bruteforce☆33Jun 27, 2016Updated 9 years ago
- macOS application that makes use of the EndpointSecurity framework☆19Aug 1, 2019Updated 6 years ago
- A log collector for Peach fuzzing in the cloud☆28Apr 2, 2014Updated 11 years ago
- Anti Hacking Team TrustedBSD module☆27Sep 25, 2014Updated 11 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- A PoC Mach-O infector via library injection☆65Mar 5, 2013Updated 12 years ago
- A tool for Mac OS X proxy kext generation to export kernel symbols☆27Jan 5, 2018Updated 8 years ago
- FlockFlock: File Access Policy Enforcement for macOS☆26Aug 2, 2016Updated 9 years ago
- Mac OS X syscall hook kext☆22Feb 16, 2016Updated 9 years ago
- Bypass Google's Santa☆22Apr 13, 2015Updated 10 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- Simply C program slicing tool in C☆10Jun 19, 2015Updated 10 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- Some POCs or Exploits for vulnerabilities☆12Feb 17, 2019Updated 6 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- A kext to facilitate calling PE_enter_debugger on machines that don't respect Cmd-Ctrl-Opt-Shift-Esc☆15Aug 8, 2018Updated 7 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Mar 12, 2022Updated 3 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Dec 20, 2025Updated last month
- ☆12May 6, 2020Updated 5 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- small utility to dump kernel memory☆26Jul 23, 2014Updated 11 years ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- FUD Metasploit Android Payload☆11Nov 30, 2015Updated 10 years ago
- various exploits☆32Jul 7, 2012Updated 13 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆14Mar 26, 2015Updated 10 years ago
- A cross-platform custom NOR firmware loader and custom IPSW generator for the iPhone☆16Oct 11, 2014Updated 11 years ago
- A Mac OS X kernel mode filter driver ( a kernel extension ) for devices, file systems and network☆169Jan 27, 2018Updated 8 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Jan 5, 2017Updated 9 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- A kernel extension to mitigate Gatekeeper bypasses☆49Nov 9, 2015Updated 10 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago