redplait / lkcdLinks
ugly code to check linux kernel memory and dump some internal structures
☆48Updated 10 months ago
Alternatives and similar repositories for lkcd
Users that are interested in lkcd are comparing it to the libraries listed below
Sorting:
- LKRG bypass methods☆73Updated 5 years ago
- Breaking Secure Boot with SMM☆41Updated 3 years ago
- iTLB multihit PoC☆42Updated last year
- Python bindings for the Microsoft Hypervisor Platform APIs.☆79Updated 6 years ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆161Updated 3 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆54Updated 6 years ago
- ☆48Updated 5 years ago
- SPI flash read MitM attack PoC☆38Updated 3 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆39Updated 3 years ago
- A fast execution trace symbolizer for Windows.☆129Updated last year
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆32Updated 2 years ago
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆34Updated last year
- ☆32Updated 8 years ago
- ☆133Updated 2 weeks ago
- A tool to perform so called BGE attack☆25Updated 3 months ago
- Kernel Read Write Execute☆46Updated 8 months ago
- Python interface for Binexport, the Bindiff export format☆15Updated last month
- Python bindings for BochsCPU☆37Updated 2 months ago
- Another (bad) ROP gadget finder, but this time in Rust☆22Updated last year
- Slides, recordings and materials of my public presentations, talks and workshops.☆79Updated 4 months ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- Windows API listing in JSON format - generated from SDK headers + SDK API documentation☆66Updated 5 years ago
- ☆36Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆30Updated 5 years ago
- ☆94Updated last year
- PoC multi-layer protector for ELF32 x86 binaries☆11Updated 3 years ago
- A system call interception tool☆58Updated 10 months ago
- ☆79Updated 9 months ago
- Binary exploitation by confusing the unwinder☆65Updated 2 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year