A hacky tool for analysing linux kernel commits
☆39Feb 7, 2023Updated 3 years ago
Alternatives and similar repositories for lica
Users that are interested in lica are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Curated collection of resources, examples and scripts for Linux kernel devs, researchers and hobbyists.☆62Nov 3, 2022Updated 3 years ago
- uacatcher open source repo☆22Jul 22, 2023Updated 2 years ago
- ☆11Jan 6, 2020Updated 6 years ago
- ☆15Sep 26, 2021Updated 4 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆69Nov 13, 2025Updated 4 months ago
- python exp of pwnable' problems☆18Feb 5, 2024Updated 2 years ago
- PEDA - Python Exploit Development Assistance for GDB☆24Aug 6, 2025Updated 8 months ago
- ☆307Aug 13, 2021Updated 4 years ago
- Fuzzing SILK with AFL☆25May 29, 2020Updated 5 years ago
- linux kernel cross page attack demo module☆32Mar 15, 2023Updated 3 years ago
- ☆82Sep 3, 2021Updated 4 years ago
- An architecture independent binary analysis tool for fingerprinting functions through NLP☆15Updated this week
- LKRG bypass methods☆74Jan 10, 2020Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- blackhat usa 2022 I attended☆72Sep 23, 2022Updated 3 years ago
- CTF challenges that I created☆19Dec 26, 2021Updated 4 years ago
- Auto-generated CodeQL rules for matching CVE vulnerabilities and variants.☆184Sep 19, 2024Updated last year
- ☆16Sep 16, 2021Updated 4 years ago
- ☆48Nov 15, 2021Updated 4 years ago
- ☆23Apr 6, 2019Updated 7 years ago
- Ghidra analyzer for UEFI firmware.☆18Jun 24, 2023Updated 2 years ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆84Jan 20, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- ☆190Feb 8, 2025Updated last year
- Guiding Program Synthesis by Learning to Generate Examples☆13Jul 23, 2023Updated 2 years ago
- Heroes of newerth scripting pack☆19Jan 21, 2023Updated 3 years ago
- ☆38Jan 6, 2025Updated last year
- This is the project of LearnAFL.☆28Aug 27, 2020Updated 5 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- ☆13Dec 14, 2021Updated 4 years ago
- ☆134Mar 9, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- headless-ida-mcp-server☆40Apr 4, 2025Updated last year
- Large Commit Precise Vulnerability Dataset based on AOSP CVE☆66May 12, 2023Updated 2 years ago
- https://rs3lab.github.io/SynCord/☆26Nov 23, 2022Updated 3 years ago
- Windows KASLR bypass using prefetch side-channel☆177Apr 26, 2024Updated last year
- SALT - SLUB ALlocator Tracer for the Linux kernel☆157Sep 10, 2018Updated 7 years ago
- ugly code to check linux kernel memory and dump some internal structures☆48Nov 20, 2024Updated last year
- Tool to archive RPM packages and attest to their authenticity☆15Jun 5, 2025Updated 10 months ago