POC for Phantom Attack
☆89Aug 10, 2022Updated 3 years ago
Alternatives and similar repositories for phantom-attack
Users that are interested in phantom-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Disable SSL certificate verification for all binaries that use libssl☆48Jul 15, 2022Updated 3 years ago
- Linux Kernel Runtime Integrity with eBPF☆184Nov 23, 2023Updated 2 years ago
- IDA plugin that displays the P-code for the current function☆72Nov 18, 2025Updated 4 months ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- Example BPF program with LSM hooks☆36Feb 24, 2021Updated 5 years ago
- Various eBPF programs for tracing network connections☆32Oct 26, 2021Updated 4 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- AFL bindings for Unicorn-Engine☆89Sep 19, 2025Updated 6 months ago
- ☆28Nov 24, 2021Updated 4 years ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago
- Binary Ninja Plugin for RISC-V☆15Nov 29, 2023Updated 2 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆62Feb 22, 2017Updated 9 years ago
- ☆18Jan 19, 2022Updated 4 years ago
- A set of Android binary exploitation tasks for beginners.☆29Jul 16, 2019Updated 6 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- fuzz the linux kernel bpf verifier☆83Oct 9, 2021Updated 4 years ago
- A file system events notifier based on eBPF☆74Dec 5, 2025Updated 3 months ago
- ☆10Dec 3, 2021Updated 4 years ago
- ☆11Jul 14, 2020Updated 5 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- ETrace is a syscall tracing utility powered by eBPF☆26Feb 26, 2023Updated 3 years ago
- ☆40Feb 3, 2026Updated last month
- Go语言,不允许import,请开始你的表演☆62Aug 6, 2022Updated 3 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆101Apr 5, 2022Updated 3 years ago
- ☆177Jun 18, 2023Updated 2 years ago
- ☆103Mar 8, 2022Updated 4 years ago
- ☆312Jul 10, 2023Updated 2 years ago
- ☆24Nov 23, 2019Updated 6 years ago
- CVE-2022-3910☆12Mar 14, 2023Updated 3 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- A multi-architecture and cross-platform debugger baked by Qiling Framework☆88Jul 30, 2022Updated 3 years ago
- BTF introspection tool☆40Nov 26, 2025Updated 3 months ago
- 转换Pxx的vmp文件(check.bin, mw.bin)到.class☆28Mar 15, 2023Updated 3 years ago
- 2019 and 2020 Top Conference Paper☆12Apr 19, 2021Updated 4 years ago
- 计算自身md5的最小ELF64程序.The minimum ELF64 program to calculate its own md5☆11Apr 20, 2020Updated 5 years ago
- ☆26May 10, 2021Updated 4 years ago
- Exploit code for CVE-2021-1961☆121Sep 7, 2022Updated 3 years ago
- BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more☆22Jun 17, 2022Updated 3 years ago