n132 / Dec-Safe-LinkingLinks
A general way to Recover Safe linking protected value/pointer
☆13Updated 3 years ago
Alternatives and similar repositories for Dec-Safe-Linking
Users that are interested in Dec-Safe-Linking are comparing it to the libraries listed below
Sorting:
- ☆72Updated last year
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91Updated 3 years ago
- ☆34Updated 3 years ago
- ☆30Updated 3 years ago
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆96Updated 2 years ago
- a new class of file structure attacks☆57Updated 3 years ago
- ☆46Updated 3 years ago
- DC28CTF challenge parallel-af. Dataflow machine.☆59Updated 5 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆127Updated 8 years ago
- Add debugging tools to an existing initramfs, even if it is for a foreign architecture☆23Updated last year
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆47Updated 2 years ago
- my writeups (mainly pwnable)☆35Updated last year
- Old and new CTFs about Linux kernel exploitation.☆63Updated 3 years ago
- Yet another xinetd docker used to build pwnable challenges.☆37Updated 6 years ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆46Updated 3 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆156Updated 4 years ago
- ☆13Updated 4 years ago
- ☆175Updated 6 years ago
- qemu vulnerablity.☆53Updated 4 years ago
- My solutions for CTF challenges☆74Updated this week
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆69Updated last month
- ☆16Updated 2 years ago
- ☆80Updated 2 years ago
- ☆43Updated 4 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Updated 6 years ago
- Writeup for rwctf2019-final-printer☆14Updated 6 years ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆83Updated 11 months ago
- Material and examples for a presentation on static binary analysis.☆46Updated 4 years ago
- BSOD: Binary-only Scalable fuzzing Of device Drivers☆164Updated 4 years ago
- fuzzing + concolic = fuzzolic :)☆127Updated last month