A general way to Recover Safe linking protected value/pointer
☆15Oct 23, 2022Updated 3 years ago
Alternatives and similar repositories for Dec-Safe-Linking
Users that are interested in Dec-Safe-Linking are comparing it to the libraries listed below
Sorting:
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- PWN Challenge☆11Apr 28, 2022Updated 3 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- ☆21Nov 14, 2024Updated last year
- Writeups for various CTFs☆17Nov 20, 2018Updated 7 years ago
- CTF-PWN LEARNING MATERIALS☆22Jun 25, 2024Updated last year
- ☆17Dec 30, 2020Updated 5 years ago
- ☆23Oct 12, 2023Updated 2 years ago
- keystone-engine bindings python. support Xcode10 compilation in Mojave. targets for ida macOS☆29Oct 24, 2021Updated 4 years ago
- API2Vec: Learning Representations of API Sequences for Malware Detection☆14Mar 10, 2024Updated last year
- MPU-6050 Accelerometer and Gyroscope code☆11Aug 4, 2014Updated 11 years ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆15Sep 10, 2022Updated 3 years ago
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆106Jan 13, 2026Updated last month
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆47Sep 2, 2023Updated 2 years ago
- Python bindings for Shimple/Jimple IR from Soot.☆43Feb 5, 2026Updated 3 weeks ago
- Dev resources of Harmony☆15Mar 4, 2024Updated last year
- ☆10Dec 26, 2023Updated 2 years ago
- 最新漏洞收集、复现、漏洞环境☆10Mar 21, 2019Updated 6 years ago
- A customized version of Ella used in the paper `An Empirical Study of Android Test Generation Tools in Industrial Cases`.☆10Aug 19, 2020Updated 5 years ago
- Integration fork of QEMU focusing on XNU platforms (arm, aarch64, etc)☆12Dec 12, 2022Updated 3 years ago
- Microbenchmarks for x86_64 kernel entry methods☆20Feb 21, 2022Updated 4 years ago
- Python常用代码段☆11Sep 8, 2021Updated 4 years ago
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆13Sep 10, 2024Updated last year
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆13Mar 30, 2024Updated last year
- ACI-GetStarted☆11Jun 4, 2025Updated 8 months ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Extract texts + their page numbers from PDF☆12Nov 25, 2024Updated last year
- Unofficial Android remote control app for Euro Truck Simulator 2 (ETS2) / American Truck Simulator (ATS)☆10Mar 16, 2022Updated 3 years ago
- ☆20Updated this week
- A collection of Apple-related CTF writeups☆15Jan 17, 2022Updated 4 years ago
- A simple Mali 6xx/7xx register interface model that doesn't do any rendering.☆13Jan 29, 2016Updated 10 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- A collection of pure Python crypto implementations. All modules are standalone. Available in Python 2 and Python 3 flavors!☆10Mar 2, 2013Updated 13 years ago
- A PDF that shows its own MD5☆11Jan 2, 2023Updated 3 years ago