taviso / scanlimitsLinks
Tool to examine the behaviour of setuid binaries under constrained limits.
☆61Updated 4 years ago
Alternatives and similar repositories for scanlimits
Users that are interested in scanlimits are comparing it to the libraries listed below
Sorting:
- ☆92Updated 7 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 3 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated 3 months ago
- LKRG bypass methods☆73Updated 5 years ago
- A tool like /bin/ps but uses /proc/kcore for walking the tasklist; this finds hidden processes☆58Updated 10 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆50Updated 3 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- ☆36Updated 4 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- (Linux Kernel) Stack Monitoring Tool☆47Updated 3 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated last year
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- General Research Repository - Only updated when I feel like it☆28Updated 10 months ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- ☆52Updated 6 years ago
- a pstree mod that prints other helpful information and with added functionality☆24Updated 5 years ago
- collection of verified Linux kernel exploits☆188Updated 4 years ago
- ASLREKT is a proof of concept for an unfixed generic local ASLR bypass in Linux.☆25Updated 5 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- Binary Protocol Differ☆118Updated 5 years ago
- ☆246Updated 4 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 6 years ago
- a friendly wrapper around ptrace☆133Updated 3 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆30Updated 5 years ago