Notes on QEMU and Debian MIPS (big-endian)
☆45Nov 12, 2018Updated 7 years ago
Alternatives and similar repositories for mips-hacking
Users that are interested in mips-hacking are comparing it to the libraries listed below
Sorting:
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- Collection of IDA Pro/Hex-Rays configs, scripts, and plugins☆23Mar 20, 2020Updated 5 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- EBAZ4205 Board FPGA project☆14Oct 20, 2023Updated 2 years ago
- A IDAPython script for searching overflows by IDA.☆21Sep 21, 2017Updated 8 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- A tiny tool to learn the assembly code☆12Feb 17, 2017Updated 9 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- A small, lightweight web server☆13Jan 21, 2021Updated 5 years ago
- ☆12May 22, 2018Updated 7 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- ☆13Jul 11, 2017Updated 8 years ago
- Device Tree Compiler for Windows☆15Aug 9, 2024Updated last year
- https://github.com/nongiach/arm_now rootfs and kernel☆11Sep 16, 2022Updated 3 years ago
- Generate inline assembly functions to wrap your replacement functions. Supports __usercall and __userpurge☆16Jun 16, 2023Updated 2 years ago
- A demonstration of how page tables can be used to run arbitrary code in ring-0 and lead to a privesc. Uses CVE-2016-7255 as an example.☆11Jun 11, 2018Updated 7 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- ☆16Jul 9, 2019Updated 6 years ago
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 5 months ago
- a State-Machine reversing exercise☆13Apr 22, 2021Updated 4 years ago
- Proof of concept code for DeepSteal (SP'22) Machine Learning model extraction (weight stealing) with memory side channel☆13Jun 22, 2023Updated 2 years ago
- Hardware design files for the PMOD based MUX☆13Aug 22, 2019Updated 6 years ago
- Sandboxing framework based on SECCOMP☆51May 14, 2018Updated 7 years ago
- Hisilicon SD5115 OpenOCD Config file☆13Mar 7, 2017Updated 8 years ago
- Tool to view heap chunks and memory writes (using pintool)☆42Dec 8, 2018Updated 7 years ago
- Information on EGG compression file format and UnEgg decompression module.☆18May 25, 2017Updated 8 years ago
- transfer ownership of any FB50 smart lock to yourself (CVE-2019-13143)☆16Aug 7, 2019Updated 6 years ago
- A plugin for IDA Pro that assists in decoding arbitrary character sets in an IDA Pro database into Unicode, then automatically invoking a…☆54Feb 9, 2015Updated 11 years ago
- Security Capture The Flag (CTF) competition writeups and learning notes.☆14Feb 14, 2017Updated 9 years ago
- Rode0day API Client☆18Jan 9, 2019Updated 7 years ago
- 使用intel pin来求解一部分CTF challenge☆32Jul 1, 2018Updated 7 years ago
- wrapper library for the functionality offered by ptrace. features facilities to enter breakpoint, debug and hook syscalls, etc.☆21Apr 6, 2022Updated 3 years ago
- Solutions to crackmes☆19May 22, 2015Updated 10 years ago
- idb2pat plugin, fixed to work with IDA 6.2☆23Oct 8, 2011Updated 14 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- A talk+workshop on Accelerating Your Security Learning in 2017 given at null Bangalore 2017☆13Jan 23, 2017Updated 9 years ago
- Workshop material for a Windows Attack Surface Analysis Workshop☆68May 1, 2019Updated 6 years ago
- Windbg Utility Tools based upon PyKD☆42Sep 9, 2020Updated 5 years ago
- A Linux x86_64 ELF loader in user-space written in Rust☆39Nov 28, 2020Updated 5 years ago