nh2 / strace-pipes-presentationView external linksLinks
Presentation: Debugging across pipes and sockets with strace
☆155Mar 22, 2019Updated 6 years ago
Alternatives and similar repositories for strace-pipes-presentation
Users that are interested in strace-pipes-presentation are comparing it to the libraries listed below
Sorting:
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- ☆12May 6, 2020Updated 5 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- DEFCON-RUSSIA WEB☆12Mar 30, 2021Updated 4 years ago
- Simply C program slicing tool in C☆10Jun 19, 2015Updated 10 years ago
- Custom Elasticsearch plugin example☆10Apr 26, 2017Updated 8 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆11Jan 28, 2017Updated 9 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Mar 21, 2018Updated 7 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆79May 10, 2018Updated 7 years ago
- Automates credential skimming from service accounts in Windows Registry☆78Sep 29, 2020Updated 5 years ago
- Solutions for CTFs☆10Dec 29, 2019Updated 6 years ago
- Hosted analyzers built for Grapl☆14Dec 26, 2022Updated 3 years ago
- Vagrant files to bootstrap VM for CTFs☆11Aug 21, 2016Updated 9 years ago
- Library for simulating time progression in Python☆16Aug 16, 2025Updated 5 months ago
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Jul 1, 2017Updated 8 years ago
- A CrackMe powered with a virtual machine.☆43Apr 13, 2015Updated 10 years ago
- writings on anti-reverse engineering.☆290Nov 13, 2021Updated 4 years ago
- The current repository contains all the scripts needed to build kernel-mode mac-a-mal malicious activity hooking on macOS.☆86Sep 22, 2018Updated 7 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- Hisilicon SD5115 OpenOCD Config file☆13Mar 7, 2017Updated 8 years ago
- python scripts☆15Dec 5, 2019Updated 6 years ago
- ☆164May 18, 2018Updated 7 years ago
- Offline debugger for malware's reverse engineering☆116Jan 21, 2015Updated 11 years ago
- XSS in pastebin.com and reddit.com via unsanitized markdown output☆88Apr 24, 2018Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆96Mar 7, 2018Updated 7 years ago
- Samsung CTF 2017 Problems. https://sctf.codeground.org☆24Sep 3, 2018Updated 7 years ago
- This tool automatically gets lyrics of songs from audio files using the OpenAI Whisper API.☆17May 19, 2023Updated 2 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- NSQ documentation☆13Jun 29, 2025Updated 7 months ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 7 years ago
- Collection of IDA scripts☆42Sep 20, 2017Updated 8 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 10 years ago
- A portable reverse engineering environment using docker.☆217Aug 19, 2018Updated 7 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- Presented hardware reverse engineering workshops since 2019☆61Aug 8, 2024Updated last year