lockedbyte / protcheck
A C-based checksec without readelf or grep dependance.
☆11Updated 3 years ago
Related projects: ⓘ
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆48Updated 4 years ago
- ☆15Updated 4 years ago
- Linux Kernel module-less implant (backdoor)☆64Updated 3 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- HN Security's advisories.☆20Updated 3 months ago
- ☆35Updated 3 years ago
- ☆26Updated 5 years ago
- A library for patching ELFs☆52Updated 3 years ago
- A repository teaching bss/data segment exploitation techniques.☆12Updated 5 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆23Updated 3 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆19Updated 2 years ago
- Anti-reverse Compilation☆32Updated 3 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- ☆28Updated 2 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated 8 months ago
- Tools to bypass flawed SELinux policies using the init_module system call☆38Updated 10 months ago
- Capture The Flag Binary fuzzer for Heap challanges☆38Updated 6 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆41Updated 2 years ago
- ☆82Updated 10 months ago
- Intro to Assembly Optimization stream repo☆25Updated 2 years ago
- A tool for patching binaries to use specific versions of glibc☆22Updated 5 years ago
- Binary Golf Library☆62Updated 3 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆26Updated 2 years ago
- LKRG bypass methods☆69Updated 4 years ago
- A repository to study the core components of Linux for exploitation purposes.☆30Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated last year
- Cisco RV110w UPnP stack overflow☆25Updated 2 years ago
- A javascript dll resolver for v8☆11Updated 4 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆26Updated 2 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆24Updated 3 years ago