lockedbyte / protcheckLinks
A C-based checksec without readelf or grep dependance.
☆11Updated 4 years ago
Alternatives and similar repositories for protcheck
Users that are interested in protcheck are comparing it to the libraries listed below
Sorting:
- Binary Golf Library☆61Updated 4 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 4 years ago
- ☆103Updated 3 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆72Updated 4 years ago
- tools for shellcoding☆59Updated 2 years ago
- A binary hardening system☆111Updated 2 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Updated 5 years ago
- LKRG bypass methods☆73Updated 6 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆73Updated 8 years ago
- My CTF writeups☆27Updated 4 years ago
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆50Updated 3 years ago
- ☆49Updated 5 years ago
- Anti-reverse Compilation☆33Updated 4 years ago
- SSD Challenges☆48Updated 3 years ago
- Linux Kernel N-day Exploit/Analysis.☆67Updated last year
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆202Updated 3 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- Linux Kernel module-less implant (backdoor)☆73Updated 4 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 8 months ago
- A library for patching ELFs☆62Updated 5 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 5 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- Matryoshka - stacked LKM loader☆54Updated 2 years ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆91Updated 4 years ago
- ☆28Updated 4 years ago
- Automatic ROPChain Generation☆294Updated 5 years ago