gipi / low-levelLinks
As near as possible to bare metal
☆48Updated 4 months ago
Alternatives and similar repositories for low-level
Users that are interested in low-level are comparing it to the libraries listed below
Sorting:
- Melkor is a very intuitive and easy-to-use ELF file format fuzzer to find functional and security bugs in ELF parsers.☆153Updated last year
- Exploitation on ARM-based Systems (Troopers18)☆150Updated 7 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆41Updated 7 years ago
- ☆49Updated 7 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆45Updated 7 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- Attacking the Core associated source files☆88Updated 7 years ago
- A smart file fuzzer.☆26Updated 9 years ago
- Protostart Stack Overflow Challenges compiled for ARMv6.☆56Updated 7 years ago
- Routines for hunting down kernel structs.☆41Updated 14 years ago
- Python repository containing parsed standard C library function and argument information☆28Updated 7 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 4 years ago
- SIGSTOPing ELF binaries since 0x7E1☆55Updated last year
- L1TF (Foreshadow) VM guest to host memory read PoC☆113Updated 7 years ago
- A pip wrapper around our ridiculous amount of qemu forks.☆52Updated last year
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- Arm Episodes☆78Updated 7 years ago
- Scout - Instruction based research debugger (a poor man's debugger)☆156Updated 2 years ago
- LKRG bypass methods☆73Updated 5 years ago
- Exploit Development and Reverse Engineering with GDB Made Easy☆38Updated 6 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆71Updated 8 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆128Updated 7 years ago
- Basic BIOS emulator for Unicorn Engine.☆100Updated 4 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆35Updated 8 years ago
- ARM Shellcode Generator☆103Updated 8 years ago
- A program to draw rectangles from heap traces.☆135Updated 5 years ago
- An interactive memory info for pwning / exploiting☆100Updated 2 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆25Updated 10 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 7 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆36Updated 10 years ago