lockedbyte / protcheckLinks
A C-based checksec without readelf or grep dependance.
☆11Updated 4 years ago
Alternatives and similar repositories for protcheck
Users that are interested in protcheck are comparing it to the libraries listed below
Sorting:
- Binary Golf Library☆61Updated 4 years ago
- tools for shellcoding☆58Updated 2 years ago
- ☆18Updated 5 years ago
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- SSD Challenges☆48Updated 3 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Updated 5 years ago
- ☆36Updated 4 years ago
- Linux Kernel N-day Exploit/Analysis.☆67Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 5 years ago
- A library for patching ELFs☆59Updated 5 years ago
- A binary hardening system☆110Updated 2 years ago
- ☆102Updated 3 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- qiling framework examples☆16Updated 3 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆64Updated 2 years ago
- Anti-reverse Compilation☆34Updated 4 years ago
- LKRG bypass methods☆73Updated 5 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆70Updated 4 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 9 months ago
- Research developed by Allele Security Intelligence.☆15Updated 4 months ago
- ☆27Updated 4 years ago
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆50Updated 3 years ago
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆28Updated 3 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 11 months ago
- Slides about HyperDbg☆40Updated 4 months ago