GATEKEEPER: Inline and on-target defense
☆123Sep 1, 2022Updated 3 years ago
Alternatives and similar repositories for gatekeeper
Users that are interested in gatekeeper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- Watching the Flag☆15Dec 16, 2015Updated 10 years ago
- Collection of somewhat useful stuff for CTF events☆36Jun 24, 2015Updated 10 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- jeap, exploit 10 in 0ctf 2016 quals☆15Mar 14, 2016Updated 10 years ago
- ☆15Nov 29, 2022Updated 3 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- A collection of more than 1000 binary libc files☆90Mar 26, 2015Updated 10 years ago
- ☆68Apr 27, 2020Updated 5 years ago
- My CTF writeup☆26Mar 20, 2017Updated 9 years ago
- ☆34Aug 9, 2022Updated 3 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Mar 13, 2016Updated 10 years ago
- NASM Standard Library for shellcode☆69Aug 4, 2016Updated 9 years ago
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 8 years ago
- Run basic functions from stripped binaries cross platform☆113Dec 13, 2016Updated 9 years ago
- A light ELF binary patch tool in python urwid☆147Sep 12, 2019Updated 6 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 7 years ago
- A flag submitter service with distributed attackers for attack/defense CTF games.☆71May 6, 2019Updated 6 years ago
- Visualization of heap operations.☆616Dec 5, 2024Updated last year
- python library to examine ptmalloc (the glibc userland heap implementation)☆508May 11, 2021Updated 4 years ago
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- A Return-oriented Programming toolkit☆353May 14, 2017Updated 8 years ago
- python library for dumping a linux process from memory☆34Jun 15, 2010Updated 15 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- ☆81Jun 12, 2017Updated 8 years ago
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- Architecture problem -- CSAW Finals 2016 -- @Hypersonic and @ubsan☆10Mar 4, 2017Updated 9 years ago
- ☆16Mar 26, 2017Updated 8 years ago
- WTF are those magic numbers?!!☆33Dec 20, 2021Updated 4 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆288May 24, 2016Updated 9 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- Fast implementation of php mt_rand using pyopencl and pycuda☆15Apr 16, 2020Updated 5 years ago
- Some helpful preload libraries for pwning stuff.☆1,649Mar 6, 2026Updated 2 weeks ago