lockedbyte / protcheckLinks
A C-based checksec without readelf or grep dependance.
☆11Updated 4 years ago
Alternatives and similar repositories for protcheck
Users that are interested in protcheck are comparing it to the libraries listed below
Sorting:
- Binary Golf Library☆62Updated 4 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 4 months ago
- ☆100Updated 3 years ago
- tools for shellcoding☆56Updated last year
- ☆18Updated 5 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Updated 3 years ago
- SSD Challenges☆47Updated 2 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆72Updated 2 years ago
- ☆37Updated 4 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆71Updated 8 years ago
- ☆26Updated 3 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆47Updated 2 years ago
- Linux Kernel N-day Exploit/Analysis.☆65Updated 8 months ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Linux Kernel module-less implant (backdoor)☆73Updated 4 years ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆94Updated 2 years ago
- A collection of curated resources and CVEs I use for research.☆107Updated 3 years ago
- Very simple script(s) to hasten binary exploit creation☆94Updated 4 years ago
- A happy heap editor to support your exploitation process☆196Updated 4 years ago
- Automatic ROPChain Generation☆288Updated 5 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- Dockerized setup for quick pwning☆23Updated 4 years ago
- A library for patching ELFs☆57Updated 4 years ago
- ☆84Updated 7 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- LKRG bypass methods☆72Updated 5 years ago