PoC code using debugfs to store files in memory and execute them
☆27May 25, 2018Updated 7 years ago
Alternatives and similar repositories for debugfs-backdoor
Users that are interested in debugfs-backdoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kernel-Mode Rootkit Hunter☆375Nov 13, 2021Updated 4 years ago
- REVerse ENGineering Environment☆64May 3, 2024Updated 2 years ago
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns☆20Nov 2, 2024Updated last year
- A tool to transform Android Cuttlefish images into QEMU disk images☆17Jul 12, 2024Updated last year
- ☆12May 5, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 1day practice - Escape macOS sandbox (partial) using RemoteViewServices☆45May 12, 2025Updated 11 months ago
- ☆13Dec 11, 2025Updated 4 months ago
- svn2git clone of SVN repo svn://svn.valgrind.org/valgrind, with patches for macOS☆17Jun 13, 2014Updated 11 years ago
- ☆46Aug 21, 2019Updated 6 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- The quickest way to look up something on the Mozilla Developer Network. Chrome extension.☆27Feb 29, 2016Updated 10 years ago
- Spawn Up quickly Elastic EDR Panel☆16Jan 29, 2022Updated 4 years ago
- ☆21Sep 25, 2023Updated 2 years ago
- practice☆69Mar 19, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Exploits for YARA 3.7.1 & 3.8.1☆37Dec 20, 2018Updated 7 years ago
- Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) f…☆27Mar 3, 2023Updated 3 years ago
- Windows named pipes bindings for tokio☆13Sep 26, 2018Updated 7 years ago
- Plot real-time gps reading on world vector shoreline map☆13Mar 10, 2014Updated 12 years ago
- FUSEQuota git mirror☆11Jul 21, 2015Updated 10 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- Towards a million-node RISC-V cluster.☆14Mar 6, 2025Updated last year
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆49Sep 16, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A userspace tunnel between two hosts mapping ports on client machine to addresses reachable from server machine.☆18Feb 25, 2022Updated 4 years ago
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 3 years ago
- Aegis Implicit Mail☆15Jan 27, 2023Updated 3 years ago
- GoLang binary pclntab mangler☆14Mar 2, 2020Updated 6 years ago
- Open Source Software used in Parrot Bebop☆10Jan 5, 2018Updated 8 years ago
- An attempt to synthesize GPS signals in FPGA logic.☆20Feb 17, 2026Updated 2 months ago
- Reddit client for big screen.☆15Oct 16, 2016Updated 9 years ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆61May 20, 2025Updated 11 months ago
- Simple, Flexible, Fast, Embedded httpd.☆19Dec 26, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆30Dec 4, 2018Updated 7 years ago
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 6 years ago
- Diary of a reverse-engineer blog☆20Oct 2, 2023Updated 2 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Jan 6, 2022Updated 4 years ago
- ☆11Apr 11, 2017Updated 9 years ago
- Vulnerability analyze☆17Sep 21, 2020Updated 5 years ago
- A function tracer☆92Jun 4, 2019Updated 6 years ago