gipi / low-levelLinks
As near as possible to bare metal
☆48Updated 3 months ago
Alternatives and similar repositories for low-level
Users that are interested in low-level are comparing it to the libraries listed below
Sorting:
- Exploitation on ARM-based Systems (Troopers18)☆150Updated 7 years ago
- Melkor is a very intuitive and easy-to-use ELF file format fuzzer to find functional and security bugs in ELF parsers.☆151Updated last year
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆41Updated 7 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆45Updated 6 years ago
- ☆49Updated 7 years ago
- SIGSTOPing ELF binaries since 0x7E1☆55Updated last year
- Protostart Stack Overflow Challenges compiled for ARMv6.☆56Updated 7 years ago
- Attacking the Core associated source files☆88Updated 7 years ago
- Basic BIOS emulator for Unicorn Engine.☆100Updated 4 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 4 years ago
- Research on WebAssembly☆41Updated 3 years ago
- Stuff from CTF contests☆39Updated 6 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 6 years ago
- ☆23Updated 6 years ago
- Kernel and filesystem extractor☆60Updated 3 years ago
- Scout - Instruction based research debugger (a poor man's debugger)☆156Updated 2 years ago
- ELF Infector's Toolkit☆65Updated 9 years ago
- An interactive memory info for pwning / exploiting☆100Updated 2 years ago
- radare2 + miasm2 = ♥☆102Updated 5 years ago
- Routines for hunting down kernel structs.☆41Updated 14 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- a friendly wrapper around ptrace☆133Updated 3 years ago
- Decompiler for x86 and x86-64 ELF binaries☆221Updated 6 years ago
- A novel technique to hide code from debuggers & disassemblers☆158Updated last year
- A distributed fuzzer which aims to pull in the best technologies, make them play nicely together, and run on multiple O/Ses.☆194Updated 4 years ago
- various CTF writeups☆61Updated 7 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆35Updated 8 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆69Updated 8 years ago
- Tasteless CTF 2019☆20Updated 5 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 8 years ago