rexguowork / phantom-attackLinks
POC for Phantom Attack
☆83Updated 2 years ago
Alternatives and similar repositories for phantom-attack
Users that are interested in phantom-attack are comparing it to the libraries listed below
Sorting:
- Dectect syscall hooking using eBPF☆159Updated 2 years ago
- ☆100Updated 3 years ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- An IDA processor for eBPF bytecode☆67Updated 8 months ago
- Some exploits I have written to showcase and to share☆53Updated 4 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆75Updated 2 years ago
- An IDA processor for eBPF bytecode☆48Updated 3 years ago
- My conference presentations and Materials for them.☆32Updated 2 years ago
- Alcatraz project for Black Hat USA 2021☆78Updated 3 years ago
- ☆130Updated 2 months ago
- Linux Kernel Runtime Integrity with eBPF☆180Updated last year
- Investigating the bug behind CVE-2021-26708☆27Updated 4 years ago
- Linux Kernel N-day Exploit/Analysis.☆66Updated 9 months ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆67Updated last year
- PoC of fuzzing closed-source userspace binaries with KVM☆166Updated last year
- fuzz the linux kernel bpf verifier☆83Updated 3 years ago
- qemu vulnerablity.☆53Updated 4 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- ☆19Updated 3 years ago
- BSOD: Binary-only Scalable fuzzing Of device Drivers☆161Updated 3 years ago
- Very Simple Fuzzer☆20Updated 5 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 3 years ago
- Code Property Graph (CPG) frontend for binary applications and libraries.☆90Updated 3 years ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆70Updated 10 months ago
- ☆71Updated 2 years ago
- ☆98Updated 2 years ago
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆88Updated 4 years ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆163Updated 10 months ago
- ☆115Updated last year