Operating systems playground.
☆16Sep 3, 2019Updated 6 years ago
Alternatives and similar repositories for os-playground
Users that are interested in os-playground are comparing it to the libraries listed below
Sorting:
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Tools and library to manipulate EFI variables.☆10Updated this week
- 🦑 A friendly Ruby API to iptables.☆15May 6, 2017Updated 8 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- hook: linux kernel syscall hijack☆21Dec 28, 2016Updated 9 years ago
- Thread Injection Kit. A notorious little attempt to create Windows CreateRemoteThread() equivalent on unix (*nix) platform.☆49Jul 10, 2011Updated 14 years ago
- Recon materials☆27Nov 18, 2017Updated 8 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53May 1, 2014Updated 11 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Damn vulnerable linux device driver for people to play with.☆28Feb 25, 2020Updated 6 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆34Aug 22, 2018Updated 7 years ago
- SHA-3 finalist (reference code)☆41May 2, 2014Updated 11 years ago
- Reverse-engineering tools for Android applications☆56Aug 2, 2011Updated 14 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- VS Code inspired text editor that mostly runs in a webworker☆11Updated this week
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Mary live-codes a JavaScript game from scratch – Mary Rose Cook at Front-Trends 2014☆10May 1, 2015Updated 10 years ago
- STAN is a sTAtic aNalyser☆39Jul 26, 2017Updated 8 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- Custom google chat themes☆11Jan 6, 2023Updated 3 years ago
- allows a VMWare macOS VM to be enrolled in Jamf☆10Sep 17, 2020Updated 5 years ago
- Examples of programs written in several languages☆11Apr 18, 2023Updated 2 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Build your own complete XNU kernel header set, replaces Kernel.framework. Gain access to kernel private structures and symbols etc with I…☆13Jun 21, 2018Updated 7 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- GDB scripts☆14Nov 30, 2012Updated 13 years ago