gipi / low-levelLinks
As near as possible to bare metal
☆48Updated 3 weeks ago
Alternatives and similar repositories for low-level
Users that are interested in low-level are comparing it to the libraries listed below
Sorting:
- Exploitation on ARM-based Systems (Troopers18)☆149Updated 7 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆45Updated 6 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆40Updated 6 years ago
- SIGSTOPing ELF binaries since 0x7E1☆54Updated 11 months ago
- Melkor is a very intuitive and easy-to-use ELF file format fuzzer to find functional and security bugs in ELF parsers.☆152Updated last year
- ☆21Updated 10 years ago
- Stuff from CTF contests☆39Updated 6 years ago
- Basic BIOS emulator for Unicorn Engine.☆99Updated 4 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- Protostart Stack Overflow Challenges compiled for ARMv6.☆56Updated 7 years ago
- ☆49Updated 7 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆25Updated 10 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 7 years ago
- Tasteless CTF 2019☆20Updated 5 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- (Linux Kernel) Stack Monitoring Tool☆45Updated 3 years ago
- Arm Episodes☆78Updated 7 years ago
- Writeups of CTF challenges I do☆13Updated 5 years ago
- ARM Shellcode Generator☆104Updated 7 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆99Updated 8 years ago
- r2con 2017 September 6-9☆97Updated 7 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆35Updated 8 years ago
- ELF Infector's Toolkit☆64Updated 9 years ago
- An interactive memory info for pwning / exploiting☆102Updated 2 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Updated 12 years ago
- Routines for hunting down kernel structs.☆41Updated 13 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆112Updated 6 years ago
- ☆92Updated 7 years ago