perceptionpoint / suprotect
Changing memory protection in an arbitrary process
☆47Updated 6 years ago
Alternatives and similar repositories for suprotect:
Users that are interested in suprotect are comparing it to the libraries listed below
- Exploits for YARA 3.7.1 & 3.8.1☆30Updated 6 years ago
- PoC for CVE-2017-0075☆37Updated 5 years ago
- Python based angr plug in for IDA Pro.☆34Updated 7 years ago
- Tools released in CSS 2019☆38Updated 5 years ago
- Improved version of pintool☆17Updated 8 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 4 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- python library for dumping a linux process from memory☆34Updated 14 years ago
- ☆33Updated 2 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 4 years ago
- My notes about Genyatyk VM crackme☆26Updated 4 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- ☆31Updated 7 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆15Updated 4 years ago
- ☆14Updated 2 years ago
- Python portage of the Microcode Explorer plugin☆31Updated 5 years ago
- ☆18Updated 6 years ago
- ☆47Updated 2 years ago
- Heap analysis tooling for ptmalloc☆44Updated 2 years ago
- Linux kernel rootkit to hide certain files and processes.☆36Updated 10 years ago
- Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques☆54Updated 7 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 4 years ago
- My conference presentations and publications☆26Updated 3 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- ☆30Updated 6 years ago
- An AFL scaling benchmarking tool☆18Updated 4 years ago
- by http://whereisk0shl.top/☆35Updated 6 years ago
- ☆36Updated 6 years ago