lockedbyte / protcheck
A C-based checksec without readelf or grep dependance.
☆11Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for protcheck
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆42Updated 2 years ago
- ☆98Updated 2 years ago
- LKRG bypass methods☆71Updated 4 years ago
- Linux Kernel module-less implant (backdoor)☆66Updated 3 years ago
- A library for patching ELFs☆53Updated 3 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆31Updated 4 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆24Updated 3 years ago
- ☆16Updated 4 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆66Updated 7 years ago
- ☆24Updated 3 years ago
- ☆26Updated 5 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆42Updated 11 months ago
- qiling framework examples☆15Updated 2 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆64Updated 3 years ago
- Binary Golf Library☆62Updated 3 years ago
- Anti-reverse Compilation☆32Updated 3 years ago
- A binary hardening system☆100Updated last year
- An introduction course to system exploitation based on pwnable.kr challenges☆20Updated 2 years ago
- ☆36Updated 3 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆138Updated 3 years ago
- 🔓 x86 Linux Kernel rootkit for Debian 9 (4.9.0-11-686-pae)☆33Updated 4 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆48Updated 4 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆38Updated 6 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆98Updated 2 years ago
- A collection of curated resources and CVEs I use for research.☆102Updated 3 years ago
- Protocol Reverse Engineering Resources☆20Updated last year
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆122Updated 2 years ago