netspooky / notesLinks
☆27Updated 2 years ago
Alternatives and similar repositories for notes
Users that are interested in notes are comparing it to the libraries listed below
Sorting:
- Ariadne: Binary Ninja Graph Analysis Plugin☆102Updated 9 months ago
- Binary Type Inference Ghidra Plugin☆167Updated last year
- yxd - Yuu's heX Dumper☆91Updated last year
- ☆79Updated last year
- ☆68Updated 9 months ago
- A binary hardening system☆110Updated 2 years ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 5 months ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆177Updated this week
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆159Updated 3 years ago
- Explore a live Linux kernel's memory using GDB☆117Updated 3 years ago
- Coverage-Guided Greybox Distributed Fuzzer☆132Updated 7 months ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆65Updated last year
- Binary Golf Grand Prix☆115Updated 2 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆124Updated last week
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆50Updated last year
- A stealthy ELF loader - no files, no execve, no RWX☆171Updated last year
- A tool for firmware cartography☆161Updated 5 months ago
- simple type recognition in decompiled executables☆117Updated last year
- Minimal setup to trigger the xz backdoor☆29Updated last year
- A system call interception tool☆57Updated 11 months ago
- Determine which CPU architecture is used in a binary file.☆125Updated 9 months ago
- Binary exploitation by confusing the unwinder☆66Updated 2 years ago
- Binarly Vulnerability Research Advisories☆183Updated last month
- LKRG bypass methods☆73Updated 5 years ago
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆135Updated 2 weeks ago
- Code and data artifacts for our paper: "faulTPM: Exposing AMD fTPMs’ Deepest Secrets"☆114Updated 2 years ago
- iTLB multihit PoC☆42Updated 2 years ago
- Simple syscall sandboxing for Linux☆144Updated last month
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 10 months ago