jonoberheide / ksymhunter
Routines for hunting down kernel symbols.
☆82Updated 14 years ago
Alternatives and similar repositories for ksymhunter:
Users that are interested in ksymhunter are comparing it to the libraries listed below
- Routines for hunting down kernel structs.☆40Updated 13 years ago
- Automated Return-Oriented Programming Chaining☆84Updated 8 years ago
- ☆38Updated 9 years ago
- Function redirection via ELF tricks.☆157Updated 9 years ago
- ☆60Updated 9 years ago
- De Mysteriis Dom jemalloc☆65Updated 7 years ago
- A program to draw rectangles from heap traces.☆132Updated 5 years ago
- Notes on various topics I'm interested in☆158Updated 9 years ago
- ☆63Updated 5 years ago
- PoC LibVMI-based GDB server for virtual machines☆53Updated 7 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆90Updated 9 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 8 years ago
- Library for creating CTF services.☆74Updated 8 years ago
- ☆28Updated 2 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆27Updated 8 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆36Updated 9 years ago
- ☆112Updated 11 years ago
- Implementation of the SMM rootkit "The Watcher"☆125Updated 3 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 7 years ago
- Simple ELF tools written to demonstrate libelfmaster capabilities.☆39Updated 6 years ago
- SIGSTOPing ELF binaries since 0x7E1☆52Updated 8 months ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆54Updated 8 years ago
- QEMU-based framework exposing several of QEMU-internal APIs to a LuaJIT core injected into QEMU itself. Among other things, this allows f…☆149Updated 6 years ago
- Dynamic analysis of binary programs to retrieve function-related information (arity, type of parameters, coupling).☆67Updated 7 years ago
- ☆105Updated 9 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- Adds symbols to a ELF file.☆61Updated 9 years ago
- A linux system call fuzzer using TriforceAFL☆175Updated last year
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆113Updated 7 years ago