lockedbyte / protcheckLinks
A C-based checksec without readelf or grep dependance.
☆11Updated 4 years ago
Alternatives and similar repositories for protcheck
Users that are interested in protcheck are comparing it to the libraries listed below
Sorting:
- Binary Golf Library☆61Updated 4 years ago
- ☆37Updated 4 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- A binary hardening system☆109Updated last year
- Linux Kernel N-day Exploit/Analysis.☆66Updated 9 months ago
- Ghidra scripts for recovering string definitions in Go binaries☆117Updated 8 months ago
- ☆100Updated 3 years ago
- LKRG bypass methods☆72Updated 5 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆71Updated 8 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- A library for patching ELFs☆57Updated 4 years ago
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- Fork Free Fail Repeat☆49Updated 3 years ago
- HN Security's advisories.☆22Updated 3 months ago
- SSD Challenges☆47Updated 2 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- Automatic ROPChain Generation☆291Updated 5 years ago
- An automated setup for compiling & fuzzing Apache httpd server☆50Updated 2 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- My CTF writeups☆27Updated 4 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆95Updated 2 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Updated 5 years ago
- A happy heap editor to support your exploitation process☆196Updated 4 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆45Updated 3 years ago
- Slides & Hands-on for the reverse engineering workshop☆181Updated 2 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Updated 3 years ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆63Updated 9 months ago