plusls / rootkit
国科大软件安全原理作业
☆23Updated 4 years ago
Alternatives and similar repositories for rootkit:
Users that are interested in rootkit are comparing it to the libraries listed below
- IDA Hexrays To Joern☆38Updated 5 months ago
- some ida script☆32Updated 3 years ago
- 2023年西湖论剑IoT-AWD赛题仓库☆20Updated 2 years ago
- IDA Hexrays To CodeQL☆41Updated 5 months ago
- ☆57Updated 3 years ago
- Container (Docker) escape exploits☆51Updated 3 years ago
- 2021西湖论剑IoT、虚实结合赛后开放资源☆64Updated 3 years ago
- This tool is used to handle firmware that binwalk cannot unpack directly and is mainly used for OOB removal, ECC removal, and bad block r…☆16Updated 2 years ago
- linux kernel internals research details☆45Updated last year
- ☆17Updated 4 years ago
- Linux kernel EoP exp☆75Updated 4 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Updated 2 years ago
- My PWN 练习题,异构PWN技能栈,适合IoT安全研究者。☆42Updated 3 years ago
- 更好的包装pwntools,提高编写pwn题exp效率的工具☆27Updated 4 years ago
- A collection of resources and information about CVE-2023-2033☆19Updated last year
- A Coverage-Based fuzzing tools☆23Updated 3 years ago
- 使用idapython写的一个辅助二进制固件漏洞挖掘的代码审计脚本☆47Updated 2 years ago
- iot安全题目学习记录☆16Updated 3 years ago
- CCF推荐会议论文的获取和推送☆16Updated 10 months ago
- ☆12Updated 2 years ago
- a better basefinder☆11Updated 3 years ago
- python exp of pwnable' problems☆18Updated last year
- ☆34Updated 3 years ago
- ☆51Updated 2 years ago
- ☆12Updated 2 years ago
- ☆29Updated 2 years ago
- ☆31Updated 2 years ago
- Debug pwn in docker, no need for virtual machines☆35Updated 3 years ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)☆59Updated 3 months ago
- minimum ELF64 program to calculate its own SHA256.☆18Updated 2 years ago