☆28Aug 4, 2022Updated 3 years ago
Alternatives and similar repositories for jit-spray-poc-for-ksp
Users that are interested in jit-spray-poc-for-ksp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Nov 18, 2012Updated 13 years ago
- fuzz testing framework for Linux system calls☆12Sep 4, 2015Updated 10 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- Integer overflow in IOHIDDevice/IOUSBHIDDevice☆20Jun 3, 2016Updated 9 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58May 28, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Mar 23, 2016Updated 10 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- Minimal and hacky PDF lexer☆10Jun 17, 2015Updated 10 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- SEAndroid Analytics Library for live device analysis☆60Mar 16, 2019Updated 7 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- ☆32Nov 15, 2017Updated 8 years ago
- Exploit code for CVE-2016-9066☆45Mar 19, 2017Updated 9 years ago
- ☆25Aug 10, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- framework for fuzzing various open source tools☆18Jul 24, 2015Updated 10 years ago
- ☆91Jun 23, 2016Updated 9 years ago
- CVE-2015-1805 root tool☆278Nov 23, 2017Updated 8 years ago
- ☆79May 13, 2016Updated 9 years ago
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- A light ELF binary patch tool in python urwid☆147Sep 12, 2019Updated 6 years ago
- Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.☆19Mar 4, 2016Updated 10 years ago
- The tool to decode obfuscated shellcodes using the unicorn and capstone engine☆54Jun 19, 2016Updated 9 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 9 years ago
- CVE-2015-1805 root tool☆13Oct 26, 2019Updated 6 years ago
- jeap, exploit 10 in 0ctf 2016 quals☆15Mar 14, 2016Updated 10 years ago
- TrueType Font Fuzzer☆53Nov 6, 2015Updated 10 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016☆152Nov 28, 2016Updated 9 years ago
- ☆31Apr 20, 2016Updated 9 years ago
- ☆168Apr 2, 2017Updated 8 years ago
- Android kernel module to bypass SELinux at boot☆44Apr 10, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Rust bindings for PANDA and libpanda☆24Dec 13, 2024Updated last year
- cve-2014-4323 poc☆24Oct 15, 2015Updated 10 years ago
- Windows Kernel Dump Analyzer☆15May 9, 2015Updated 10 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Apr 26, 2016Updated 9 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Oct 1, 2013Updated 12 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆288May 24, 2016Updated 9 years ago