GATEKEEPER: Inline and on-target defense
☆123Sep 1, 2022Updated 3 years ago
Alternatives and similar repositories for gatekeeper
Users that are interested in gatekeeper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- Watching the Flag☆15Dec 16, 2015Updated 10 years ago
- Collection of somewhat useful stuff for CTF events☆36Jun 24, 2015Updated 10 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- jeap, exploit 10 in 0ctf 2016 quals☆15Mar 14, 2016Updated 10 years ago
- ☆15Nov 29, 2022Updated 3 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- ☆17May 13, 2019Updated 6 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- A collection of more than 1000 binary libc files☆90Mar 26, 2015Updated 11 years ago
- ☆68Apr 27, 2020Updated 5 years ago
- My CTF writeup☆26Mar 20, 2017Updated 9 years ago
- ☆34Aug 9, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆35Aug 29, 2012Updated 13 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Mar 13, 2016Updated 10 years ago
- NASM Standard Library for shellcode☆69Aug 4, 2016Updated 9 years ago
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 8 years ago
- Run basic functions from stripped binaries cross platform☆114Dec 13, 2016Updated 9 years ago
- A light ELF binary patch tool in python urwid☆147Sep 12, 2019Updated 6 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A flag submitter service with distributed attackers for attack/defense CTF games.☆71May 6, 2019Updated 6 years ago
- Visualization of heap operations.☆616Dec 5, 2024Updated last year
- python library to examine ptmalloc (the glibc userland heap implementation)☆509May 11, 2021Updated 4 years ago
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- A Return-oriented Programming toolkit☆352May 14, 2017Updated 8 years ago
- python library for dumping a linux process from memory☆34Jun 15, 2010Updated 15 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- ☆81Jun 12, 2017Updated 8 years ago
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Architecture problem -- CSAW Finals 2016 -- @Hypersonic and @ubsan☆10Mar 4, 2017Updated 9 years ago
- ☆16Mar 26, 2017Updated 9 years ago
- WTF are those magic numbers?!!☆33Dec 20, 2021Updated 4 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆288May 24, 2016Updated 9 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- Some helpful preload libraries for pwning stuff.☆1,649Mar 6, 2026Updated last month