A general way to Recover Safe linking protected value/pointer
☆15Oct 23, 2022Updated 3 years ago
Alternatives and similar repositories for Dec-Safe-Linking
Users that are interested in Dec-Safe-Linking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- CTF-PWN LEARNING MATERIALS☆22Jun 25, 2024Updated last year
- Writeups for various CTFs☆17Nov 20, 2018Updated 7 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- ☆13Apr 27, 2020Updated 5 years ago
- Quick script to find info about a syscall in a target architecture☆18Jan 8, 2020Updated 6 years ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆15Sep 10, 2022Updated 3 years ago
- PWN Challenge☆11Apr 28, 2022Updated 3 years ago
- Bypass Android Do Not Disturb using the People and Conversations system☆11May 12, 2023Updated 2 years ago
- Sublime Text plugin that lets VoiceCode remote-control the editor☆13Jan 3, 2016Updated 10 years ago
- A tool collection of various attacks on TLS based on TLS-Attacker☆23Jun 25, 2025Updated 8 months ago
- ☆13Apr 13, 2023Updated 2 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- Personal Page☆22Jan 30, 2026Updated last month
- ☆12Apr 3, 2022Updated 3 years ago
- A collection of pure Python crypto implementations. All modules are standalone. Available in Python 2 and Python 3 flavors!☆10Mar 2, 2013Updated 13 years ago
- ☆21Nov 14, 2024Updated last year
- BuckeyeCTF 2023 Challenges☆18Oct 2, 2025Updated 5 months ago
- Enhancements for git usability when using submodules☆26Nov 11, 2015Updated 10 years ago
- ☆14Nov 9, 2017Updated 8 years ago
- A Man in the Middle proof of concept using docker containers☆21Jul 11, 2021Updated 4 years ago
- ☆21May 31, 2024Updated last year
- ☆13Dec 14, 2021Updated 4 years ago
- ☆17Dec 30, 2020Updated 5 years ago
- keystone-engine bindings python. support Xcode10 compilation in Mojave. targets for ida macOS☆29Oct 24, 2021Updated 4 years ago
- relay component repo☆13Nov 27, 2022Updated 3 years ago
- ☆15Mar 25, 2017Updated 8 years ago
- A collection of Apple-related CTF writeups☆15Jan 17, 2022Updated 4 years ago
- MPU-6050 Accelerometer and Gyroscope code☆11Aug 4, 2014Updated 11 years ago
- A integration for minimizing heat loss through optimal venting☆18Updated this week
- golang lib to buy itunes applications☆14Nov 9, 2025Updated 4 months ago
- Website that allows everyone to dive into the raw data behind weather predictions☆18Aug 13, 2024Updated last year
- 一个将 vmnote 指令集重编译成 x64 指令集的脚本,并且可以用 IDA 进行分析。☆17Jul 12, 2021Updated 4 years ago
- Group coding repository of PltCov, a tool to instrument ELF binaries for fuzzing with ngram coverage of imported APIs☆12Jan 18, 2022Updated 4 years ago
- Solutions to the Matasano Crypto Challenges☆16Jun 1, 2021Updated 4 years ago
- Detects Chinese text and displays an overlay with the corresponding pinyin, phrase translations and optionally a Google translation. Work…☆15Dec 8, 2022Updated 3 years ago
- ropr with some tweaks for better linux kernel support☆38Apr 25, 2025Updated 10 months ago