netspooky / notesLinks
☆27Updated 2 years ago
Alternatives and similar repositories for notes
Users that are interested in notes are comparing it to the libraries listed below
Sorting:
- Ariadne: Binary Ninja Graph Analysis Plugin☆94Updated 6 months ago
- ☆65Updated 5 months ago
- ☆77Updated last year
- Binary Golf Grand Prix☆113Updated last year
- yxd - Yuu's heX Dumper☆90Updated last year
- A stealthy ELF loader - no files, no execve, no RWX☆169Updated last year
- Ghidra scripts for recovering string definitions in Go binaries☆117Updated 9 months ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- ☆47Updated last month
- Binary Type Inference Ghidra Plugin☆165Updated last year
- Explore a live Linux kernel's memory using GDB☆116Updated 2 years ago
- Seer is a tool that recognizes the architecture of a binary file☆102Updated 3 years ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆162Updated 2 years ago
- Coverage-Guided Greybox Distributed Fuzzer☆131Updated 4 months ago
- Simple syscall sandboxing for Linux☆136Updated this week
- A tool for firmware cartography☆158Updated 2 months ago
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆170Updated this week
- Minimal setup to trigger the xz backdoor☆28Updated 10 months ago
- Research tools developed for Intel Wi-Fi chips☆55Updated 2 months ago
- A binary hardening system☆109Updated last year
- Damn Vulenerable Kernel Module for kernel fuzzing☆63Updated 10 months ago
- iTLB multihit PoC☆42Updated last year
- LKRG bypass methods☆72Updated 5 years ago
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆131Updated last month
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆112Updated 2 years ago
- Radamsa fuzzer ported to rust lang☆156Updated 5 months ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆49Updated 9 months ago
- Determine which CPU architecture is used in a binary file.☆121Updated 5 months ago
- Binarly Vulnerability Research Advisories☆179Updated 3 weeks ago
- Binary Golf Library☆61Updated 4 years ago