Breaking secure checksums in the scudo heap allocator
☆13Apr 9, 2020Updated 5 years ago
Alternatives and similar repositories for scudo-checksum-attack
Users that are interested in scudo-checksum-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆52Nov 22, 2021Updated 4 years ago
- Github Desktop RCE PoC☆28Dec 4, 2018Updated 7 years ago
- Open Theori Research Seminar☆18Jun 21, 2019Updated 6 years ago
- A smali emulator.☆24Jun 27, 2018Updated 7 years ago
- CVE-2022-2586: Linux kernel nft_object UAF☆20Sep 3, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Solutions and Explanations for problems at https://id0-rsa.pub☆14Apr 8, 2020Updated 5 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆58Jan 15, 2025Updated last year
- Symbolic Execution Over Processor Traces☆127Aug 14, 2024Updated last year
- Scudo useful files☆10Jul 3, 2022Updated 3 years ago
- 下载漫画咯!支持看漫画、鼠绘、漫画堆、YYLS、nhentai ~☆12Oct 25, 2023Updated 2 years ago
- An awesome list for Effective and Powerful harnesses for fuzzing using libfuzzer - fuzzers by Google☆78Sep 15, 2020Updated 5 years ago
- This module detects HTTP requests that are non RFC compliant and used for smuggling☆12Mar 16, 2023Updated 3 years ago
- Python script to split Android boot.img files.☆12Nov 11, 2012Updated 13 years ago
- For effective cheating detection in security competitions. Uses Linux Kernel Module (LKM) for generating flags.☆69Jan 17, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- Alleycat plugin by devttys0, ported to IDA 8☆11Jan 15, 2025Updated last year
- repository for kernel exploit practice☆415Nov 12, 2019Updated 6 years ago
- ida python scripts☆23Jul 23, 2018Updated 7 years ago
- Mirror of: https://code.binbash.rocks/AXP.OS/packages_apps_phonesky (requires a login)☆15Mar 4, 2026Updated 3 weeks ago
- ☆29May 13, 2018Updated 7 years ago
- A cross-platform nhentai downloader written in C#.☆14Jan 20, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CVE-2020-36109 PoC causing DoS☆17Apr 20, 2022Updated 3 years ago
- Kernel heap pointer disclosure in IOGraphicsFamily.☆13Aug 19, 2017Updated 8 years ago
- Flex 'em lexers☆42Oct 19, 2020Updated 5 years ago
- lwipのバグを半自動検出くん。First introduced in 「2018年 暗号と情報セキュリティシンポジウム」(SCIS2018).☆14Dec 7, 2022Updated 3 years ago
- 🔞 A tags chinese database of nhentai.net☆12Aug 4, 2022Updated 3 years ago
- Small tool to run reverse IP lookup for given IP, IP range or IP list☆13Jan 2, 2020Updated 6 years ago
- some notes for how to build projects into a single LLVM bitcode file.☆18Jan 16, 2019Updated 7 years ago
- Retro Game Engine inspired by the SNES-era☆25Sep 15, 2022Updated 3 years ago
- Toggle Burp proxy from anywhere and get its status in i3wm☆23Sep 2, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- collection of scripts and stuff☆12Aug 15, 2016Updated 9 years ago
- PoC BSOD for CVE-2020-16898 (badneighbor)☆21Oct 16, 2020Updated 5 years ago
- Analysis and exploitation of an use-after-free in ProFTPd☆12Jun 21, 2023Updated 2 years ago
- 『리버스 엔지니어링 바이블: 코드 재창조의 미학』 예제 코드☆13Jan 7, 2015Updated 11 years ago
- Summoner tracker overlay that synchronizes between teammates☆10Mar 23, 2023Updated 3 years ago
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Apr 22, 2015Updated 10 years ago
- ☆11Apr 10, 2018Updated 7 years ago