gipi / low-level
As near as possible to bare metal
☆44Updated last month
Related projects ⓘ
Alternatives and complementary repositories for low-level
- Yet another CTF writeups repository. PWN and RE tasks☆33Updated 4 years ago
- ☆92Updated 4 years ago
- Notes on QEMU and Debian MIPS (big-endian)☆43Updated 6 years ago
- Exploitation on ARM-based Systems (Troopers18)☆146Updated 6 years ago
- Old and new CTFs about Linux kernel exploitation.☆50Updated 2 years ago
- LKRG bypass methods☆71Updated 4 years ago
- Basic BIOS emulator for Unicorn Engine.☆98Updated 3 years ago
- A C library for mutating test cases☆13Updated 5 years ago
- ☆27Updated 6 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆28Updated 5 years ago
- Tasteless CTF 2019☆20Updated 5 years ago
- Solutions and write-ups to challenges from Pwny Racing☆24Updated 4 years ago
- Kernel and filesystem extractor☆55Updated 2 years ago
- ☆82Updated last year
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆24Updated 9 years ago
- An interactive memory info for pwning / exploiting☆100Updated last year
- ☆35Updated 3 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆38Updated 6 years ago
- ARM Shellcode Generator☆104Updated 7 years ago
- ☆18Updated 9 years ago
- Diary of a reverse-engineer blog☆20Updated last year
- Tool to extract the kallsyms (System.map) from a memory dump☆24Updated last year
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- ☆49Updated last year
- Use Ghidra Structs in Python☆28Updated 3 years ago
- ☆49Updated 6 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆57Updated 9 years ago
- Automated recovery of Linux kernel build configurations☆24Updated 2 years ago
- ASLREKT is a proof of concept for an unfixed generic local ASLR bypass in Linux.☆25Updated 4 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆20Updated 5 years ago