jhswartz / static-builds
Get statically linked utilities
☆21Updated 2 years ago
Alternatives and similar repositories for static-builds
Users that are interested in static-builds are comparing it to the libraries listed below
Sorting:
- exploit for dirtycow☆14Updated 2 years ago
- use for unlock research☆23Updated 2 years ago
- build gdb static for all support arch☆21Updated 3 years ago
- Moved to https://github.com/pkgforge/soarpkgs☆82Updated 4 months ago
- Helper script for Linux kernel disassemble or debugging with IDA Pro on VMware + GDB stub (including some symbols helpers)☆36Updated last year
- Run out-of-box multiarch Debian system on QEMU via tcg emulation.☆27Updated last week
- ☆21Updated 2 years ago
- IDA (sort of) headless☆24Updated last year
- A simple tool to inject shellcode into an ELF binary.☆15Updated 4 years ago
- PoC code for CVE-2019-14040☆26Updated 5 years ago
- Slim dockerized Android ndk☆12Updated 2 years ago
- stupid ptrace tricks☆12Updated 3 years ago
- A Go library speaking Hex-Rays IDA lumina protocol☆34Updated last year
- Utilities scripts and Python module to facilitate executing idapython scripts in IDA.☆26Updated last month
- IDA script for parsing kallsyms☆78Updated last year
- Experiment with Linux system calls (memfd_create, fexecve, fork...)☆22Updated 6 years ago
- IDA Database Importer plugin for Binary Ninja☆37Updated 8 months ago
- A collection of signature files for IDA☆15Updated 8 months ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- Raw IDA Kernel API for IDAPython☆33Updated 3 years ago
- A Linux x86_64 ELF loader in user-space written in Rust☆38Updated 4 years ago
- Jeb3 Demo (include mips && arm64 && elf && pe && wasm decompiler) without limit☆18Updated 5 years ago
- ☆18Updated 2 years ago
- ☆10Updated 3 years ago
- CVE-2021-39685 Description and sample exploit for Linux USB Gadget overflow vulnerability☆13Updated 3 years ago
- An IDA processor for eBPF bytecode☆64Updated 6 months ago
- Run command with specific selinux context for Android☆18Updated 2 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆29Updated 3 years ago
- ☆44Updated last year
- ☆41Updated 2 years ago