☆16Jun 9, 2023Updated 2 years ago
Alternatives and similar repositories for tiny_elf_sample
Users that are interested in tiny_elf_sample are comparing it to the libraries listed below
Sorting:
- CVE-2022-0185 exploit rewritten with pipe primitive☆17Apr 5, 2022Updated 3 years ago
- CVE-2022-25636 exploit rewritten with pipe primitive☆20Apr 5, 2022Updated 3 years ago
- Updated IDA ReObjc Plugin for 7.4+ and python3☆13Apr 17, 2021Updated 4 years ago
- gdb plugin for linux kernel to debug slub☆52May 11, 2020Updated 5 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- A Cython reverse helper with analyzing Ghidra P-Code. For 2024 CTFCON.☆11Aug 16, 2024Updated last year
- Merge multi binaries into one IDA database.☆24Jan 18, 2022Updated 4 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆101Apr 5, 2022Updated 3 years ago
- exploit for dirtycow☆14Dec 21, 2022Updated 3 years ago
- A gdb plugin for linux kernel.☆28Jul 14, 2023Updated 2 years ago
- ☆15Nov 27, 2023Updated 2 years ago
- CVE-2021-22555 exploit rewritten with pipe primitive☆37May 18, 2022Updated 3 years ago
- CVE-2022-3910☆12Mar 14, 2023Updated 3 years ago
- ☆24Dec 11, 2022Updated 3 years ago
- ☆16Apr 12, 2023Updated 2 years ago
- IdaClu is a version agnostic IDA Pro plugin for grouping similar functions. Pick an existing grouping algorithm or create your own.☆182Feb 10, 2026Updated last month
- Malware that TeamTNT found and removed.☆14Nov 27, 2020Updated 5 years ago
- Go语言,不允许import,请开始你的表演☆62Aug 6, 2022Updated 3 years ago
- exploit code for a bpf heap overflow vulnerability☆28Sep 3, 2019Updated 6 years ago
- derper's mom☆13Oct 28, 2025Updated 4 months ago
- A solution for llvmvm in MRCTF2022☆11Apr 27, 2022Updated 3 years ago
- CVE-2021-4034 POC and Docker and Analysis write up☆12May 23, 2022Updated 3 years ago
- ida pro theme☆14Aug 20, 2018Updated 7 years ago
- ☆137May 1, 2023Updated 2 years ago
- linux kernel LPE using hw_breakpoint attack tech demo☆26Mar 24, 2023Updated 2 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆19Jun 30, 2022Updated 3 years ago
- IDAPython / IDC tips and tricks☆38Oct 25, 2022Updated 3 years ago
- a pwn demo for easy manage a pwn server☆25Aug 3, 2016Updated 9 years ago
- ☆12May 24, 2022Updated 3 years ago
- multiarch qemu system env for playing and debugging :)☆32Nov 3, 2021Updated 4 years ago
- file or one command☆11Oct 29, 2023Updated 2 years ago
- huaweictf2020-xctf高校网络安全挑战赛☆17Dec 28, 2020Updated 5 years ago
- Exploit for CVE-2022-27666☆205Mar 28, 2022Updated 3 years ago
- ARM Cortex A7 Qualcomm IPQ4018 QSEE (TrustZone) exploit☆20Oct 14, 2024Updated last year
- Source code for the DEF CON 30 CTF Qualifiers.☆266May 27, 2024Updated last year
- My challenges for SECCON CTF 2022 Finals☆18Feb 15, 2023Updated 3 years ago
- A set of Android binary exploitation tasks for beginners.☆29Jul 16, 2019Updated 6 years ago
- 用于存放IDA的研究资料和文档☆95Mar 3, 2021Updated 5 years ago