国科大软件安全原理作业
☆25Oct 27, 2020Updated 5 years ago
Alternatives and similar repositories for rootkit
Users that are interested in rootkit are comparing it to the libraries listed below
Sorting:
- A coverage-guided and memory-detection enabled fuzzer for windows applications.☆32Feb 1, 2021Updated 5 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆16Jun 5, 2024Updated last year
- some notes for how to build projects into a single LLVM bitcode file.☆18Jan 16, 2019Updated 7 years ago
- An automated ROP generation work☆12Mar 5, 2025Updated last year
- 国科大操作系统高级教程-linux_kernel-课堂项目☆17Jul 10, 2019Updated 6 years ago
- 看起来叫BabyBypass,实际啥都会记一些☆16Sep 10, 2023Updated 2 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆11Aug 8, 2022Updated 3 years ago
- clfs CVE 的一些 POC 收集☆16Oct 27, 2022Updated 3 years ago
- A IntelliJ Plugin for Tabby to Find Vulnerabilities Easily☆39Nov 12, 2024Updated last year
- ☆17Oct 31, 2022Updated 3 years ago
- A benchmark for Java gadget chain detecting algorithms.☆15Jun 20, 2025Updated 9 months ago
- ☆17Jan 28, 2026Updated last month
- 中国科学院大学2020届研一课程资料分享☆22Jan 27, 2021Updated 5 years ago
- Implementation of the paper "Improving the Accuracy-Robustness Trade-off of Classifiers via Adaptive Smoothing".☆10Feb 6, 2024Updated 2 years ago
- ☆18Nov 7, 2024Updated last year
- Secure Inference Resilient Against Malicious Clients☆14May 3, 2022Updated 3 years ago
- LSE recruitment 2016 - Memory Checker☆11Jul 3, 2016Updated 9 years ago
- IDE/AL - Alias-Aware Framework for Interprocedural Dataflow Analysis☆10Mar 10, 2018Updated 8 years ago
- Debug pwn in docker, no need for virtual machines☆38Oct 10, 2025Updated 5 months ago
- Exploiting CVE-2016-2334 7zip HFS+ vulnerability☆10Nov 29, 2017Updated 8 years ago
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- A hybrid analysis framework to aid in uncovering deserialization vulnerabilities☆15Oct 13, 2024Updated last year
- The Web Application Hacker's Handbook 2 (Web应用黑客手册第二版翻译)☆20May 25, 2025Updated 9 months ago
- prebuild angr wheels for Windows on x86_64☆15Jul 21, 2018Updated 7 years ago
- ☆11Mar 5, 2023Updated 3 years ago
- jie.ac.cn 中国杰学院☆11Jun 27, 2023Updated 2 years ago
- WooYun Drops Markdown☆14Jun 28, 2020Updated 5 years ago
- 自用的shellcode生成框架☆33Jul 5, 2023Updated 2 years ago
- HOLMES: Health OnLine Model Ensemble Serving for Deep Learning Models in Intensive Care Units (KDD 2020)☆12Jan 25, 2021Updated 5 years ago
- Thesis for my masters in Computer Science☆11Jul 10, 2017Updated 8 years ago
- ☆11May 16, 2024Updated last year
- The FreeBSD ICMP buffer overflow, freebsd buffer overflow poc☆10Apr 28, 2025Updated 10 months ago
- Cisco ASA Software and ASDM Security Research☆87Sep 6, 2022Updated 3 years ago
- implementation of ideas from 'Neutaint: Efficient Dynamic Taint Analysis with Neural Networks'☆14Sep 17, 2019Updated 6 years ago
- ☆17Jul 20, 2018Updated 7 years ago
- ☆21May 4, 2017Updated 8 years ago
- This CG provides a safe space to assess use cases, modularization (role, scope, outcomes), existing and emerging AI architectures, progre…☆23Oct 9, 2025Updated 5 months ago
- Rootkit。 进程监控。☆11Jul 19, 2016Updated 9 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆59Dec 7, 2021Updated 4 years ago