netspooky / notesLinks
☆27Updated 2 years ago
Alternatives and similar repositories for notes
Users that are interested in notes are comparing it to the libraries listed below
Sorting:
- Simple syscall sandboxing for Linux☆142Updated last month
- ☆68Updated 7 months ago
- Ariadne: Binary Ninja Graph Analysis Plugin☆96Updated 7 months ago
- ☆79Updated last year
- Explore a live Linux kernel's memory using GDB☆117Updated 2 years ago
- Binary Type Inference Ghidra Plugin☆166Updated last year
- A binary hardening system☆109Updated 2 years ago
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆171Updated 2 weeks ago
- yxd - Yuu's heX Dumper☆90Updated last year
- A stealthy ELF loader - no files, no execve, no RWX☆171Updated last year
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- Damn Vulenerable Kernel Module for kernel fuzzing☆64Updated 11 months ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 3 months ago
- Binary Golf Grand Prix☆113Updated last year
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆162Updated 3 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆119Updated 10 months ago
- LKRG bypass methods☆73Updated 5 years ago
- Radamsa fuzzer ported to rust lang☆157Updated 6 months ago
- Arbitrary Speculative Code Execution with Return Instructions☆172Updated last year
- A tool for firmware cartography☆158Updated 3 months ago
- simple type recognition in decompiled executables☆114Updated last year
- Determine which CPU architecture is used in a binary file.☆122Updated 6 months ago
- Minimal setup to trigger the xz backdoor☆28Updated 11 months ago
- Fast, parallel, cross-variant ROP/JOP gadget search for x86/x64 binaries.☆117Updated last year
- Binarly Vulnerability Research Advisories☆180Updated 2 weeks ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆50Updated 10 months ago
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆122Updated last week
- ☆50Updated 3 months ago
- Coverage-Guided Greybox Distributed Fuzzer☆132Updated 5 months ago
- An architecture-agnostic ELF file flattener for shellcode☆217Updated 3 years ago