☆14Sep 26, 2021Updated 4 years ago
Alternatives and similar repositories for ridl_leak_kaslr
Users that are interested in ridl_leak_kaslr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GDB for pwn☆11Sep 10, 2025Updated 6 months ago
- PEDA - Python Exploit Development Assistance for GDB☆23Aug 6, 2025Updated 7 months ago
- Merge multi binaries into one IDA database.☆24Jan 18, 2022Updated 4 years ago
- A code-searching/completion tool, for IDA APIs☆83Jan 22, 2025Updated last year
- ☆39Jun 6, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- My-CTF-Challenges☆15Sep 27, 2021Updated 4 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- 0CTF 2015 Final web problem☆16Apr 27, 2015Updated 10 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- ☆18Mar 28, 2023Updated 3 years ago
- ☆31Feb 20, 2022Updated 4 years ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Jan 2, 2017Updated 9 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆101Apr 5, 2022Updated 3 years ago
- CVE-2021-4154 exploit☆67Oct 7, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- ARM Cortex A7 Qualcomm IPQ4018 QSEE (TrustZone) exploit☆20Oct 14, 2024Updated last year
- RISCV-V disassembler for IDA Pro☆25Mar 26, 2017Updated 9 years ago
- View Linux perf traces in IDA Pro☆15Nov 18, 2019Updated 6 years ago
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆99Mar 29, 2023Updated 2 years ago
- ☆13Dec 14, 2021Updated 4 years ago
- ☆219Aug 27, 2025Updated 7 months ago
- ☆15Nov 27, 2023Updated 2 years ago
- SALT - SLUB ALlocator Tracer for the Linux kernel☆156Sep 10, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- Janus: a state-of-the-art file system fuzzer on Linux☆234Dec 23, 2019Updated 6 years ago
- ☆287Apr 23, 2020Updated 5 years ago
- linux kernel LPE using hw_breakpoint attack tech demo☆26Mar 24, 2023Updated 3 years ago
- Updated sample code for OS X and iOS Kernel Programming book☆38Jan 14, 2019Updated 7 years ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆12Mar 8, 2022Updated 4 years ago
- vendor☆17Feb 7, 2017Updated 9 years ago
- Code Analysis and Semantic Retrieval Library with Smart Strategies☆34Mar 6, 2026Updated 3 weeks ago
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆94Apr 11, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆126Aug 3, 2024Updated last year
- A hacky tool for analysing linux kernel commits☆39Feb 7, 2023Updated 3 years ago
- uacatcher open source repo☆22Jul 22, 2023Updated 2 years ago
- baseband security research☆84Apr 7, 2021Updated 4 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆33Apr 6, 2022Updated 3 years ago
- Debugger for the Shannon Baseband☆59Jun 15, 2020Updated 5 years ago
- ☆16Jun 23, 2024Updated last year