hugsy / gef-legacyView external linksLinks
Legacy version of GEF running for GDB+Python2
☆18Jul 21, 2023Updated 2 years ago
Alternatives and similar repositories for gef-legacy
Users that are interested in gef-legacy are comparing it to the libraries listed below
Sorting:
- ☆13Nov 1, 2017Updated 8 years ago
- All android crackme challenges, created by me.☆22Oct 12, 2021Updated 4 years ago
- Extract data of TTD trace file to a minidump☆31Jul 31, 2023Updated 2 years ago
- ☆35Jan 27, 2025Updated last year
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆59Dec 7, 2021Updated 4 years ago
- CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code☆37Sep 8, 2020Updated 5 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆39Nov 26, 2024Updated last year
- ☆35Sep 18, 2015Updated 10 years ago
- LPE for CVE-2020-1054 targeting Windows 7 x64☆85Jun 17, 2020Updated 5 years ago
- kernel pool windbg extension☆83Jul 23, 2015Updated 10 years ago
- CTF writeups☆42Mar 28, 2022Updated 3 years ago
- A really dumb proof of concept that bundles the nightly branch builds of all of the *arr applications into a single container.☆15Updated this week
- IoT CVEs as abnormal events to evaluate a real-time host-based IDS. https://doi.org/10.1016/j.future.2022.03.001☆12Mar 16, 2022Updated 3 years ago
- Find alpha, manage positions in Polymarket☆34Updated this week
- WinDbg plugin to trace module transitions from a debugged driver.☆40Dec 22, 2025Updated last month
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- ☆49Jun 30, 2020Updated 5 years ago
- 《算法竞赛入门经典》第二版(第2版)-例题习题解答☆10May 10, 2021Updated 4 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- this is how tenda's camera was pwned☆18Jun 3, 2025Updated 8 months ago
- ☆11Aug 15, 2021Updated 4 years ago
- Block-based software vulnerability fuzzing framework☆49Dec 22, 2018Updated 7 years ago
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆54Mar 9, 2025Updated 11 months ago
- Various CTF challenge solutions☆12Apr 20, 2021Updated 4 years ago
- Debugging PyO3 with Visual Studio Code☆16Apr 5, 2025Updated 10 months ago
- ☆12Jul 27, 2017Updated 8 years ago
- This is another try to run JavaVM on termux☆10Jul 30, 2021Updated 4 years ago
- ☆13Aug 25, 2021Updated 4 years ago
- by Gary O'Leary-Steele | cloned from https://sentinel.appcheck-ng.com/static/pm/logger.html☆12Sep 16, 2019Updated 6 years ago
- 107逢甲-安全程式設計-教材與CTF題目☆12Nov 2, 2019Updated 6 years ago
- ☆11Updated this week
- Work In Progress☆10Jul 10, 2024Updated last year
- Programming jig for ESP-12 modules using Wemos D1 Mini ESP8266 Module and Pogo Pins☆14Jul 24, 2022Updated 3 years ago
- Auto Move Your Cursor to the Focused Window while You Alt-Tab or Touchboard for Windows☆10Dec 11, 2024Updated last year
- Tool to decompress data from Windows 10 page files and memory dumps, that has been compressed by the Windows 10 memory manager.☆51Apr 9, 2019Updated 6 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- Linux uhid api in Go.☆12Sep 27, 2023Updated 2 years ago
- [Forked] This repo is for learning various heap exploitation techniques.☆10Sep 6, 2018Updated 7 years ago
- MouHidInputHook enables users to filter, modify, and inject mouse input data packets into the input data stream of HID USB mouse devices …☆11Jul 11, 2019Updated 6 years ago