lockedbyte / protcheckLinks
A C-based checksec without readelf or grep dependance.
☆11Updated 4 years ago
Alternatives and similar repositories for protcheck
Users that are interested in protcheck are comparing it to the libraries listed below
Sorting:
- Binary Golf Library☆61Updated 4 years ago
- ☆36Updated 4 years ago
- A library for patching ELFs☆57Updated 4 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated last year
- ☆100Updated 3 years ago
- A binary hardening system☆109Updated last year
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- ☆26Updated 4 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- Very simple script(s) to hasten binary exploit creation☆92Updated 4 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- Linux Kernel N-day Exploit/Analysis.☆67Updated 10 months ago
- A happy heap editor to support your exploitation process☆197Updated 4 years ago
- Research developed by Allele Security Intelligence.☆13Updated last month
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆49Updated 2 years ago
- ☆18Updated 5 years ago
- LKRG bypass methods☆73Updated 5 years ago
- tools for shellcoding☆56Updated 2 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆201Updated 3 years ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆109Updated 2 years ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆95Updated 2 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 6 months ago
- All ROPemporium binaries categorized by architecture, with solving scripts and custom flags☆23Updated 2 years ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆65Updated 8 years ago
- ☆49Updated 4 years ago
- Slides about HyperDbg☆39Updated 2 months ago