国科大软件安全原理作业
☆25Oct 27, 2020Updated 5 years ago
Alternatives and similar repositories for rootkit
Users that are interested in rootkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A coverage-guided and memory-detection enabled fuzzer for windows applications.☆32Feb 1, 2021Updated 5 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆16Jun 5, 2024Updated last year
- Fastjson Poc for 1.2.33~1.2.36 with bcel☆11Oct 27, 2020Updated 5 years ago
- some notes for how to build projects into a single LLVM bitcode file.☆18Jan 16, 2019Updated 7 years ago
- ☆11Jan 8, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An automated ROP generation work☆12Mar 5, 2025Updated last year
- 国科大操作系统高级教程-linux_kernel-课堂项目☆17Jul 10, 2019Updated 6 years ago
- 看起来叫BabyBypass,实际啥都会记一些☆16Sep 10, 2023Updated 2 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆11Aug 8, 2022Updated 3 years ago
- clfs CVE 的一些 POC 收集☆16Oct 27, 2022Updated 3 years ago
- A IntelliJ Plugin for Tabby to Find Vulnerabilities Easily☆39Nov 12, 2024Updated last year
- ☆17Oct 31, 2022Updated 3 years ago
- A benchmark for Java gadget chain detecting algorithms.☆16Jun 20, 2025Updated 11 months ago
- LSE recruitment 2016 - Memory Checker☆11Jul 3, 2016Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- IDE/AL - Alias-Aware Framework for Interprocedural Dataflow Analysis☆10Mar 10, 2018Updated 8 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆25Sep 18, 2017Updated 8 years ago
- Exploiting CVE-2016-2334 7zip HFS+ vulnerability☆10Nov 29, 2017Updated 8 years ago
- Debug pwn in docker, no need for virtual machines☆38Oct 10, 2025Updated 7 months ago
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- A hybrid analysis framework to aid in uncovering deserialization vulnerabilities☆15Oct 13, 2024Updated last year
- A syscall hooking system for FreeBSD, NetBSD and also Linux.☆16Nov 14, 2021Updated 4 years ago
- prebuild angr wheels for Windows on x86_64☆15Jul 21, 2018Updated 7 years ago
- ☆10Mar 5, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- jie.ac.cn 中国杰学院☆11Jun 27, 2023Updated 2 years ago
- WooYun Drops Markdown☆14Jun 28, 2020Updated 5 years ago
- 自用的shellcode生成框架☆33Jul 5, 2023Updated 2 years ago
- Thesis for my masters in Computer Science☆11Jul 10, 2017Updated 8 years ago
- Source code for Jellyfish, a soft real-time inference serving system☆15Dec 20, 2022Updated 3 years ago
- The FreeBSD ICMP buffer overflow, freebsd buffer overflow poc☆10Apr 28, 2025Updated last year
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- Cisco ASA Software and ASDM Security Research☆87Sep 6, 2022Updated 3 years ago
- ☆10Nov 9, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆16Jul 20, 2018Updated 7 years ago
- ☆21May 4, 2017Updated 9 years ago
- This CG provides a safe space to assess use cases, modularization (role, scope, outcomes), existing and emerging AI architectures, progre…☆29Oct 9, 2025Updated 7 months ago
- [DATE 2023] Pipe-BD: Pipelined Parallel Blockwise Distillation☆12Jul 13, 2023Updated 2 years ago
- SAGA: A Security Architecture for Governing AI Agentic Systems☆22May 5, 2026Updated 2 weeks ago
- Public Cybersecurity Research & Advisories☆22Apr 22, 2026Updated 3 weeks ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆59Dec 7, 2021Updated 4 years ago