lockedbyte / protcheck
A C-based checksec without readelf or grep dependance.
☆11Updated 3 years ago
Alternatives and similar repositories for protcheck:
Users that are interested in protcheck are comparing it to the libraries listed below
- Linux Kernel module-less implant (backdoor)☆72Updated 4 years ago
- The Dumb Network Fuzzer☆20Updated last year
- Linux Kernel N-day Exploit/Analysis.☆63Updated 5 months ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆26Updated 3 years ago
- a pstree mod that prints other helpful information and with added functionality☆24Updated 4 years ago
- ☆49Updated 6 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆48Updated 4 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- A library for patching ELFs☆53Updated 4 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆30Updated 4 years ago
- ☆12Updated 3 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆27Updated 4 years ago
- ☆20Updated 5 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- ☆99Updated 3 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- ☆36Updated 4 years ago
- ☆17Updated 4 years ago
- A central place to store statically compiled tools I use when auditing a Linux based device.☆13Updated 4 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆42Updated 3 years ago
- ☆48Updated 4 years ago
- Binary Golf Library☆62Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- Slides about HyperDbg☆30Updated 10 months ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- A collection of curated resources and CVEs I use for research.☆105Updated 3 years ago