gdbinit / readkmem
small utility to dump kernel memory
☆25Updated 10 years ago
Alternatives and similar repositories for readkmem:
Users that are interested in readkmem are comparing it to the libraries listed below
- Vulnerability research and development.☆25Updated 9 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 7 years ago
- Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.☆18Updated 9 years ago
- Visualize an ELF's execution☆10Updated 10 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 10 years ago
- Quickly find references to the specified Immediate number, or find the function call of specifies offset, and generate C++ functions call…☆25Updated 8 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 7 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆36Updated 9 years ago
- cve-2014-4323 poc☆24Updated 9 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆52Updated 10 years ago
- reproduce the experiment in the report.☆27Updated 10 years ago
- OS X rootkit loader version #2☆12Updated 9 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- ☆14Updated 9 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 9 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Updated 9 years ago
- ☆16Updated 9 years ago
- ☆26Updated 8 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆39Updated 9 years ago
- ☆25Updated 8 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Updated 12 years ago
- ☆9Updated 9 years ago
- Fuzzer☆43Updated 10 years ago
- ☆71Updated 10 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆58Updated 8 years ago
- XED based Disassembly Engine☆19Updated 6 years ago
- CVE-2015-2231 POC☆10Updated 9 years ago
- Collection of IDA Pro plugins I wrote over the years☆23Updated 14 years ago
- ☆15Updated 9 years ago