POC for Phantom Attack
☆89Aug 10, 2022Updated 3 years ago
Alternatives and similar repositories for phantom-attack
Users that are interested in phantom-attack are comparing it to the libraries listed below
Sorting:
- IDA plugin that displays the P-code for the current function☆72Nov 18, 2025Updated 3 months ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago
- Disable SSL certificate verification for all binaries that use libssl☆48Jul 15, 2022Updated 3 years ago
- Linux Kernel Runtime Integrity with eBPF☆184Nov 23, 2023Updated 2 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- Various eBPF programs for tracing network connections☆32Oct 26, 2021Updated 4 years ago
- AFL bindings for Unicorn-Engine☆89Sep 19, 2025Updated 5 months ago
- ☆28Nov 24, 2021Updated 4 years ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- fuzz the linux kernel bpf verifier☆83Oct 9, 2021Updated 4 years ago
- ☆18Jan 19, 2022Updated 4 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆101Apr 5, 2022Updated 3 years ago
- Example BPF program with LSM hooks☆36Feb 24, 2021Updated 5 years ago
- A set of Android binary exploitation tasks for beginners.☆29Jul 16, 2019Updated 6 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆63Feb 22, 2017Updated 9 years ago
- ☆32Sep 6, 2021Updated 4 years ago
- A multi-architecture and cross-platform debugger baked by Qiling Framework☆88Jul 30, 2022Updated 3 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- Archive of AAA CTF 2022 (XCTF competition)☆78Nov 6, 2024Updated last year
- Exploit code for CVE-2021-1961☆121Sep 7, 2022Updated 3 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more☆22Jun 17, 2022Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- An IDA processor for eBPF bytecode☆69Nov 7, 2024Updated last year
- ☆40Feb 3, 2026Updated 3 weeks ago
- CTF pwn problem writeup☆40Apr 23, 2023Updated 2 years ago
- ☆24Dec 11, 2022Updated 3 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,670Jun 17, 2024Updated last year
- ☆103Mar 8, 2022Updated 3 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- CVE-2022-3910☆12Mar 14, 2023Updated 2 years ago
- ☆16Updated this week
- Execute Shellcode And Other Goodies From MMC☆14Jun 17, 2015Updated 10 years ago
- ☆12Aug 16, 2022Updated 3 years ago
- Terraform playbook of a vulnerable Azure deployment☆10Apr 28, 2022Updated 3 years ago
- My own tools for developing kernel modules☆15Sep 23, 2025Updated 5 months ago
- Binary Ninja Plugin for RISC-V☆14Nov 29, 2023Updated 2 years ago
- repo about binary exploitation☆12Dec 5, 2023Updated 2 years ago