ropr with some tweaks for better linux kernel support
☆38Apr 25, 2025Updated 11 months ago
Alternatives and similar repositories for kropr
Users that are interested in kropr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Library for constructing data-centric processing pipelines☆12Mar 16, 2026Updated last week
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- The materials of the "Hypervisors for Hackers: Security from the Hardware Up" class held at Global Cybersecurity Camp 2026 Vietnam.☆55Mar 4, 2026Updated 3 weeks ago
- ☆172Jan 5, 2025Updated last year
- GEF - GDB Enhanced Features - bata24's fork☆634Updated this week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- TheRomanXpl0it is an italian academic CTF team from Sapienza, University of Rome.☆14Updated this week
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆243Dec 23, 2024Updated last year
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆107Jan 13, 2026Updated 2 months ago
- kernel-pwn and writeup collection☆707Oct 2, 2023Updated 2 years ago
- Easily debug processes running in docker containers☆29Jun 22, 2024Updated last year
- ☆16Jun 9, 2025Updated 9 months ago
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- ☆23Jul 18, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆13Apr 27, 2020Updated 5 years ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆70Nov 13, 2025Updated 4 months ago
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- ☆13Jun 12, 2024Updated last year
- a new class of file structure attacks☆60Nov 19, 2022Updated 3 years ago
- ☆14Feb 4, 2020Updated 6 years ago
- repo about binary exploitation☆12Dec 5, 2023Updated 2 years ago
- Integration fork of QEMU focusing on XNU platforms (arm, aarch64, etc)☆12Dec 12, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Infrastructure powering the pwn.college dojo☆434Mar 3, 2026Updated 3 weeks ago
- Generate Rust Emulators and Disassemblers from Ghidra Sleigh.☆17Jul 18, 2023Updated 2 years ago
- binary ninja cli for agents☆67Mar 14, 2026Updated 2 weeks ago
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 5 months ago
- Seccomp (libseccomp2) adapter for the Nim language☆11Jul 31, 2021Updated 4 years ago
- Fast and flexible challenge downloader for all major CTF platforms☆14Oct 20, 2025Updated 5 months ago
- ☆107Aug 9, 2024Updated last year
- ☆190Feb 8, 2025Updated last year
- A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative (currently x86 only)☆547Jun 4, 2025Updated 9 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- 记录一下Windows下的Hook技巧☆15Jul 15, 2024Updated last year
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- Implementation of Silvio Cesare text infection technic☆10Jan 5, 2018Updated 8 years ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 7 months ago
- ☆15Feb 9, 2022Updated 4 years ago
- A tool for synthesizing code-reuse attacks (aka ROP) from a reference program, powered by logical modeling of Ghidra's `p-code` IL.☆24Dec 25, 2025Updated 3 months ago
- A high performance Nim implementation of a Cyclic Polynomial Hash, aka BuzHash, and the Rabin-Karp algorithm☆16Apr 2, 2019Updated 6 years ago