A ptrace based sandbox. (PoC)
☆14Jun 3, 2018Updated 7 years ago
Alternatives and similar repositories for p-sandbox
Users that are interested in p-sandbox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 12 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Dec 12, 2014Updated 11 years ago
- Check a Windows PE file for some basic security flags☆12Jun 2, 2015Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Proof of Concept for Netgear Routerlogin.com exploit☆17Feb 9, 2020Updated 6 years ago
- The project black zone☆18Nov 9, 2017Updated 8 years ago
- Firmware for supported CAN adapters☆12Mar 4, 2015Updated 11 years ago
- Easy sandboxing for rust☆11Jun 19, 2016Updated 9 years ago
- Resources related to GitHub Security Lab☆15May 7, 2021Updated 4 years ago
- fanotify cron system☆21Sep 15, 2015Updated 10 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- Mass Parallel Secure Shell command execution☆12Nov 9, 2025Updated 4 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- PS Vita Webkit Exploit / Mini SDK and Testing Framework☆34Nov 6, 2014Updated 11 years ago
- Corpus of crypto formats☆12Dec 2, 2022Updated 3 years ago
- blog☆14Jan 1, 2020Updated 6 years ago
- Apache log file parser written in Python☆12Dec 8, 2012Updated 13 years ago
- ☆22Dec 31, 2018Updated 7 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Nov 18, 2012Updated 13 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- gosec动态规则修改版☆12Jun 29, 2021Updated 4 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- LG Root Exploit☆36Jun 26, 2013Updated 12 years ago
- Lua "back-end" for BIND with dlz_dlopen()☆10Dec 10, 2011Updated 14 years ago
- derper's mom☆13Oct 28, 2025Updated 4 months ago
- This bash script restricts ssh to a set of commands via .ssh/authorized_keys☆19Jun 21, 2013Updated 12 years ago
- Ghost in the shell php file security scanner☆12Jan 31, 2022Updated 4 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- System Security Checker is a bundle of small shell scripts to assess your computer security.☆16Aug 31, 2019Updated 6 years ago
- Perform WiFi scans from python in OSX. Simply import this module and run wifi_scan()☆18Feb 27, 2016Updated 10 years ago
- ☆39Jun 6, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A smart file fuzzer.☆26Aug 19, 2016Updated 9 years ago
- Outdated. See https://github.com/saleae/jtag-analyzer for the official Saleae JTAG Analyzer☆12May 21, 2018Updated 7 years ago
- ☆12Jun 10, 2019Updated 6 years ago
- [F]aster [U]niversal [U]npacker☆61Jul 27, 2013Updated 12 years ago
- MicroMVC Framework Libraries☆43Dec 5, 2014Updated 11 years ago
- Windows builds for use with angr framework☆29Feb 12, 2016Updated 10 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago