Checksec
☆2,309Mar 14, 2026Updated last week
Alternatives and similar repositories for checksec
Users that are interested in checksec are comparing it to the libraries listed below
Sorting:
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,105Feb 28, 2025Updated last year
- PEDA - Python Exploit Development Assistance for GDB☆6,111Jul 29, 2024Updated last year
- CTF framework and exploit development library☆13,315Mar 5, 2026Updated 2 weeks ago
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,386Dec 16, 2025Updated 3 months ago
- The best tool for finding one gadget RCE in libc.so.6☆2,304Mar 5, 2026Updated 2 weeks ago
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆10,197Mar 16, 2026Updated last week
- GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Li…☆8,058Updated this week
- Build a database of libc offsets to simplify exploitation☆1,858Oct 23, 2024Updated last year
- A repository for learning various heap exploitation techniques.☆8,475Jan 15, 2026Updated 2 months ago
- The 'exploitable' GDB plugin☆747Aug 13, 2022Updated 3 years ago
- A powerful and user-friendly binary analysis platform!☆8,556Updated this week
- Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)☆3,313Jan 6, 2026Updated 2 months ago
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆2,131Sep 14, 2025Updated 6 months ago
- Checksec, but for Windows: static detection of security mitigations in executables☆609Jan 13, 2025Updated last year
- A collection of links related to Linux kernel security and exploitation☆6,386Mar 7, 2026Updated 2 weeks ago
- UNIX-like reverse engineering framework and command-line toolset☆23,269Updated this week
- Firmware Analysis Tool☆13,754Feb 5, 2026Updated last month
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆6,103Updated this week
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆6,389Updated this week
- A fork of AFL for fuzzing Windows binaries☆2,545Mar 13, 2026Updated last week
- gdb for pwn☆967Aug 29, 2025Updated 6 months ago
- Platform for emulation and dynamic analysis of Linux-based firmware☆2,052Jul 21, 2024Updated last year
- Course materials for Modern Binary Exploitation by RPISEC☆5,950Dec 9, 2021Updated 4 years ago
- A True Instrumentable Binary Emulation Framework☆5,850Nov 5, 2025Updated 4 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,560Updated this week
- LIEF - Library to Instrument Executable Formats (C++, Python, Rust)☆5,316Updated this week
- Some setup scripts for security research tools.☆9,333Mar 1, 2026Updated 3 weeks ago
- Diaphora, the most advanced Free and Open Source program diffing tool.☆4,211Nov 24, 2024Updated last year
- Checksec tool in Python, Rich output. Based on LIEF☆351Mar 13, 2026Updated last week
- A fork and successor of the Sulley Fuzzing Framework☆2,323Feb 15, 2026Updated last month
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,774Apr 3, 2024Updated last year
- Provide powerful tools for seccomp analysis☆1,098Mar 5, 2026Updated 2 weeks ago
- A Coverage Explorer for Reverse Engineers☆2,515Feb 14, 2026Updated last month
- Some helpful preload libraries for pwning stuff.☆1,649Mar 6, 2026Updated 2 weeks ago
- An advanced memory forensics framework☆7,982May 16, 2025Updated 10 months ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,812Dec 4, 2025Updated 3 months ago
- Script for searching the extracted firmware file system for goodies!☆1,196Aug 29, 2023Updated 2 years ago
- cwe_checker finds vulnerable patterns in binary executables☆1,327Apr 10, 2025Updated 11 months ago
- My proof-of-concept exploits for the Linux kernel☆1,569Sep 11, 2025Updated 6 months ago