tower111 / pwn-change-libcView external linksLinks
修改二进制文件依赖的libc ,ctf pwn的实用小工具
☆14Sep 27, 2023Updated 2 years ago
Alternatives and similar repositories for pwn-change-libc
Users that are interested in pwn-change-libc are comparing it to the libraries listed below
Sorting:
- ☆13Jun 3, 2020Updated 5 years ago
- LibVMI Python bindings☆35Sep 4, 2025Updated 5 months ago
- 2020西湖论剑IOT闯关赛赛后开放资源☆57Nov 25, 2020Updated 5 years ago
- ☆25Apr 6, 2018Updated 7 years ago
- Slides, exploits and PoCs :)☆94Jan 12, 2019Updated 7 years ago
- New Found 0-days!☆36Dec 4, 2019Updated 6 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- 常用CTF爆破字典整理☆14Apr 8, 2023Updated 2 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 3 months ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- 常见CTF出题脚本与解题脚本☆16Mar 10, 2024Updated last year
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- The ICS^2 Matrix is a threat taxonomy for Programmable Logic Controllers and Industrial Control Systems☆13Sep 10, 2024Updated last year
- wannabe (up-to-date) 64bit port of lguest☆14May 11, 2011Updated 14 years ago
- 最新漏洞收集、复现、漏洞环境☆10Mar 21, 2019Updated 6 years ago
- TEA cipher in CBC mode written in DRAKON Editor + C as a fun exercise.☆15Jun 6, 2012Updated 13 years ago
- simple class to extract 1st page from pdf document and create a compressed png file out of it☆10May 20, 2014Updated 11 years ago
- 用于辅助安全工程师漏洞挖掘、测试、复现,集合了mock、httplog、dns tools、xss,可用于测试各类无 回显、无法直观判断或特定场景下的漏洞。☆12Apr 2, 2021Updated 4 years ago
- ☆12Apr 1, 2025Updated 10 months ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆11Nov 6, 2022Updated 3 years ago
- ☆14May 5, 2020Updated 5 years ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆13Mar 30, 2024Updated last year
- Environment for CVE-2018-1273 (Spring Data Commons)☆10Aug 15, 2018Updated 7 years ago
- Dev resources of Harmony☆15Mar 4, 2024Updated last year
- A fast way to reach commonly used operation☆10Feb 6, 2018Updated 8 years ago
- Pentest Console - Manage the pentest process with ease. [DEPRECATED]☆18Jan 8, 2012Updated 14 years ago
- Shadow Attack, LiRA, Quantile Regression and RMIA implementations in PyTorch (Online version)☆14Nov 8, 2024Updated last year
- GUI / CLI tools & resources used for Capture-The-Flags competitions and Computer Security learning☆12Aug 11, 2021Updated 4 years ago
- Microbenchmarks for x86_64 kernel entry methods☆20Feb 21, 2022Updated 3 years ago
- Ghidra变强术,一个Ghidra脚本库,二进制安全,PWN☆12Jan 21, 2024Updated 2 years ago
- ☆11Jan 8, 2022Updated 4 years ago
- A simple Mali 6xx/7xx register interface model that doesn't do any rendering.☆13Jan 29, 2016Updated 10 years ago
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year
- EwoMail是基于Linux的企业邮箱服务器,集成了众多优秀稳定的组件,是一个快速部署、简单高效、多语言、安全稳定的邮件解决方案☆13Nov 25, 2022Updated 3 years ago
- 本人打CTF常用的脚本集合☆11Aug 27, 2024Updated last year
- use angr to deobfuscation☆10Oct 8, 2019Updated 6 years ago
- 一些平时自己整理的fuzz字典和爆破字典☆15Mar 24, 2020Updated 5 years ago