POC for Phantom Attack
☆90Aug 10, 2022Updated 3 years ago
Alternatives and similar repositories for phantom-attack
Users that are interested in phantom-attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Disable SSL certificate verification for all binaries that use libssl☆48Jul 15, 2022Updated 3 years ago
- Linux Kernel Runtime Integrity with eBPF☆186Nov 23, 2023Updated 2 years ago
- IDA plugin that displays the P-code for the current function☆72Nov 18, 2025Updated 5 months ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- Example BPF program with LSM hooks☆36Feb 24, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Various eBPF programs for tracing network connections☆32Oct 26, 2021Updated 4 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- AFL bindings for Unicorn-Engine☆89Apr 10, 2026Updated 3 weeks ago
- ☆27Nov 24, 2021Updated 4 years ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 3 years ago
- Binary Ninja Plugin for RISC-V☆15Nov 29, 2023Updated 2 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆63Feb 22, 2017Updated 9 years ago
- ☆18Jan 19, 2022Updated 4 years ago
- A set of Android binary exploitation tasks for beginners.☆29Jul 16, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- fuzz the linux kernel bpf verifier☆83Oct 9, 2021Updated 4 years ago
- A file system events notifier based on eBPF☆74Dec 5, 2025Updated 5 months ago
- ☆11Jul 14, 2020Updated 5 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆22Dec 11, 2022Updated 3 years ago
- ETrace is a syscall tracing utility powered by eBPF☆26Feb 26, 2023Updated 3 years ago
- ☆40Feb 3, 2026Updated 3 months ago
- Go语言,不允许import,请开始你的表演☆62Aug 6, 2022Updated 3 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆102Apr 5, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆181Jun 18, 2023Updated 2 years ago
- ☆314Jul 10, 2023Updated 2 years ago
- ☆102Mar 8, 2022Updated 4 years ago
- ☆24Nov 23, 2019Updated 6 years ago
- CVE-2022-3910☆13Mar 14, 2023Updated 3 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- ☆12Jun 2, 2021Updated 4 years ago
- A multi-architecture and cross-platform debugger baked by Qiling Framework☆88Jul 30, 2022Updated 3 years ago
- BTF introspection tool☆40Mar 30, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 转换Pxx的vmp文件(check.bin, mw.bin)到.class☆29Mar 15, 2023Updated 3 years ago
- 2019 and 2020 Top Conference Paper☆12Apr 19, 2021Updated 5 years ago
- 计算自身md5的最小ELF64程序.The minimum ELF64 program to calculate its own md5☆11Apr 20, 2020Updated 6 years ago
- Exploit code for CVE-2021-1961☆122Sep 7, 2022Updated 3 years ago
- ☆25May 10, 2021Updated 4 years ago
- ebpfkit is a rootkit powered by eBPF☆846Feb 28, 2023Updated 3 years ago
- BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more☆22Jun 17, 2022Updated 3 years ago