A tool for patching binaries to use specific versions of glibc
☆21Jun 16, 2019Updated 6 years ago
Alternatives and similar repositories for bowkin
Users that are interested in bowkin are comparing it to the libraries listed below
Sorting:
- 一个基于 Qiling 的 函数仿真工具。可以从一个 ELF 文件中选取特定函数执行,并将执行结果导出。☆15Aug 10, 2022Updated 3 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Dec 14, 2017Updated 8 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Jun 11, 2019Updated 6 years ago
- PA OTA updates application☆14Oct 12, 2015Updated 10 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- A collection of tools and schemas in Rust to analyze data on IPFS and BitSwap traces.☆10Dec 3, 2025Updated 2 months ago
- All Write-up pushed by RasyidMF. This repository is created for private or public learning purposes☆10Oct 16, 2020Updated 5 years ago
- ☆10Mar 13, 2022Updated 3 years ago
- Bennu Game Development☆11Aug 1, 2022Updated 3 years ago
- Software Exploitation☆11Sep 22, 2025Updated 5 months ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Some literature published on topics around IoT & Cybersecurity☆13Oct 13, 2025Updated 4 months ago
- NATO Interoperability Standards and Profiles☆17Apr 12, 2024Updated last year
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 4 years ago
- signs things with ssh-ed25519 keys☆13Jan 4, 2019Updated 7 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- ☆10Mar 31, 2016Updated 9 years ago
- ☆12Aug 17, 2020Updated 5 years ago
- The setup being used for mobile exploitation in the TCP1P CTF 2023☆13Nov 17, 2023Updated 2 years ago
- Maze generation algorithms☆10Nov 29, 2024Updated last year
- Implementation of Modbus protocol for a data logger project back that I worked back in my 3rd year of college. This is a low overhead wir…☆14Jan 26, 2012Updated 14 years ago
- LuaFFI bindings for Intel Hyperscan, primarily intended for use with OpenResty.☆10Feb 21, 2024Updated 2 years ago
- Quantum Insert/FoxAcid case study☆16May 18, 2017Updated 8 years ago
- CTF writeups by ./Vespiary☆16Nov 12, 2023Updated 2 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- A web interface for pass, a UNIX password manager☆11May 24, 2022Updated 3 years ago
- Gui system information tool written in C++ similar to neofetch☆10May 30, 2023Updated 2 years ago
- Python framework for collecting and analyzing TLS certificate data via the Certificate Transparency Network☆12May 25, 2025Updated 9 months ago
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Jan 16, 2026Updated last month
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆11Apr 14, 2015Updated 10 years ago
- A pre-compiler that lets you embed HTML into C code (like PHP but with C)☆12May 15, 2022Updated 3 years ago
- SAMPLE: Elixir Application☆13Jan 26, 2021Updated 5 years ago
- (DEPRECATED) A set of launcher scripts to be used with OAR and Slurm for running jobs on the UL HPC platform☆14Oct 23, 2020Updated 5 years ago
- Package antideb - basic anti-debugging and anti-reverse engineering protection for your application. Performs basic detection functions s…☆11Mar 2, 2021Updated 4 years ago
- TLS Tracing examples using eBPF against the OpenSSL Library☆15Jun 26, 2022Updated 3 years ago
- Core Elixir IPFS☆12Jan 26, 2025Updated last year
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- ☆11Dec 10, 2017Updated 8 years ago
- The Super Vulnerable Java Application (SVJA), as demonstrated in the Roniel and DaRon Podcast Show, is an Apache Struts application desig…☆13Jan 1, 2026Updated 2 months ago