☆16Dec 28, 2016Updated 9 years ago
Alternatives and similar repositories for pwntools-glibc-buffering
Users that are interested in pwntools-glibc-buffering are comparing it to the libraries listed below
Sorting:
- Linux network namespace sysctl safety verifier.☆11Jun 20, 2021Updated 4 years ago
- Emulate native integer and floating-point types in Python☆20May 15, 2023Updated 2 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆29Aug 17, 2023Updated 2 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆27Aug 4, 2022Updated 3 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Aug 7, 2016Updated 9 years ago
- ☆27Apr 6, 2018Updated 7 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆32Feb 23, 2020Updated 6 years ago
- C standard library and communication layer for the Supercard DSTwo☆14Sep 29, 2017Updated 8 years ago
- CTF platform we wrote and used for justCTF 2019☆12Jun 25, 2022Updated 3 years ago
- Software Exploitation☆11Sep 22, 2025Updated 5 months ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- ☆12Apr 29, 2019Updated 6 years ago
- A BPF-based syscall fault injector☆107Mar 2, 2026Updated last week
- Awesome BLE Hack repository☆12Apr 7, 2019Updated 6 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- Presentations, Videos, and Sample Source from Austin LLVM Meetups☆11Jul 23, 2020Updated 5 years ago
- Create presentation with react component.☆10Dec 12, 2016Updated 9 years ago
- This repo contains materials from Just Hit the Core CTF team workshops organized thanks to KNI Kernel at AGH University of Science and Te…☆11Jan 10, 2018Updated 8 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- Detect if running in a VM or on real hardware☆14Aug 23, 2014Updated 11 years ago
- `penv`: a better `env` & `venv`☆12May 24, 2017Updated 8 years ago
- HWP Document Fuzzer (Simple OLE Structure Parsing)☆15Dec 30, 2014Updated 11 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- ☆13Dec 7, 2023Updated 2 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- ☆12Aug 13, 2014Updated 11 years ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Jan 2, 2017Updated 9 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- Get the IP adresses of Bittorrent Peers☆13Oct 14, 2016Updated 9 years ago
- CVE-2023-40028 affects Ghost, an open source content management system, where versions prior to 5.59.1 allow authenticated users to uploa…☆13Jan 7, 2025Updated last year
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Just a vault template to help someone on the certificate.☆12Sep 3, 2025Updated 6 months ago
- Kernel heap pointer disclosure in IOGraphicsFamily.☆13Aug 19, 2017Updated 8 years ago
- ☆10Feb 7, 2020Updated 6 years ago
- Memory inspection REPL interface☆45Oct 14, 2017Updated 8 years ago