PoC code using debugfs to store files in memory and execute them
☆27May 25, 2018Updated 7 years ago
Alternatives and similar repositories for debugfs-backdoor
Users that are interested in debugfs-backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Challenges used in CUCTF 2019☆25Oct 13, 2019Updated 6 years ago
- Docker-based CTF Platform☆15Jul 22, 2019Updated 6 years ago
- presentations given by CU Cyber☆14Aug 23, 2020Updated 5 years ago
- Kernel-Mode Rootkit Hunter☆375Nov 13, 2021Updated 4 years ago
- Source material for FIRSTWiki github pages site☆11May 18, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Set up your own CTF with NIZKCTF☆14Oct 20, 2017Updated 8 years ago
- REVerse ENGineering Environment☆64May 3, 2024Updated last year
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns☆20Nov 2, 2024Updated last year
- Command Line Parsing Library for USB PCAP Files☆29Jul 24, 2024Updated last year
- ☆12May 5, 2021Updated 4 years ago
- 1day practice - Escape macOS sandbox (partial) using RemoteViewServices☆44May 12, 2025Updated 10 months ago
- ☆46Aug 21, 2019Updated 6 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) f…☆27Mar 3, 2023Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Spawn Up quickly Elastic EDR Panel☆13Jan 29, 2022Updated 4 years ago
- ☆21Sep 25, 2023Updated 2 years ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- practice☆69Mar 19, 2020Updated 6 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆37Dec 20, 2018Updated 7 years ago
- Windows named pipes bindings for tokio☆12Sep 26, 2018Updated 7 years ago
- ☆34May 6, 2022Updated 3 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆22Jun 6, 2017Updated 8 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Dec 12, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆49Sep 16, 2024Updated last year
- GoLang binary pclntab mangler☆14Mar 2, 2020Updated 6 years ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆60May 20, 2025Updated 10 months ago
- ☆73Feb 28, 2024Updated 2 years ago
- Const FNV1A hashing implementation.☆15Aug 13, 2022Updated 3 years ago
- Lets Safari play embedded WebM videos on supported imageboards: 4chan, 8chan, Gelbooru and Danbooru.☆10Apr 29, 2019Updated 6 years ago
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 5 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Diary of a reverse-engineer blog☆20Oct 2, 2023Updated 2 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Jan 6, 2022Updated 4 years ago
- A function tracer☆92Jun 4, 2019Updated 6 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- spec for Chat on Lightning☆14Dec 30, 2022Updated 3 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆57Aug 17, 2019Updated 6 years ago
- Some exploits I have written to showcase and to share☆53Mar 24, 2021Updated 5 years ago