zznop / bn-kconfig-recoverView external linksLinks
Automated recovery of Linux kernel build configurations
☆25Jan 14, 2022Updated 4 years ago
Alternatives and similar repositories for bn-kconfig-recover
Users that are interested in bn-kconfig-recover are comparing it to the libraries listed below
Sorting:
- Binary Ninja plugin for importing symbols to a kernel binary from /proc/kallsyms☆21Oct 3, 2025Updated 4 months ago
- Tool to extract the kallsyms (System.map) from a memory dump☆29Aug 17, 2023Updated 2 years ago
- Linux network namespace sysctl safety verifier.☆11Jun 20, 2021Updated 4 years ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Jan 2, 2017Updated 9 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆101Apr 5, 2022Updated 3 years ago
- Binary Ninja plugin suite for SEGA Genesis ROM hacking☆27Nov 4, 2024Updated last year
- ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.☆27Feb 3, 2021Updated 5 years ago
- A GCC plugin to dump the final layout of a struct.☆35Dec 2, 2024Updated last year
- ☆28Aug 26, 2025Updated 5 months ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- House of Gods Heap Exploitation Technique☆19Dec 5, 2022Updated 3 years ago
- Old and new CTFs about Linux kernel exploitation.☆64Mar 28, 2022Updated 3 years ago
- My-CTF-Challenges☆15Sep 27, 2021Updated 4 years ago
- IDA Pro Python plugin to analyze and annotate Linux kernel alternatives☆24Dec 15, 2021Updated 4 years ago
- Microsoft Edge MemGC Internals☆17Sep 2, 2015Updated 10 years ago
- BinaryNinja plugin to introduce some quality of life utilities for obsessive compulsive CTF enthusiasts☆24Jul 31, 2024Updated last year
- Project Vault Range PoC: Know your enemy and yourself to build better defense-in-depth solution!☆47Apr 5, 2025Updated 10 months ago
- Add debugging tools to an existing initramfs, even if it is for a foreign architecture☆24Aug 28, 2024Updated last year
- REVerse ENGineering Environment☆63May 3, 2024Updated last year
- SALT - SLUB ALlocator Tracer for the Linux kernel☆156Sep 10, 2018Updated 7 years ago
- Visualize IonMonkey CFGs using GraphViz.☆51Dec 12, 2019Updated 6 years ago
- ☆103Nov 20, 2022Updated 3 years ago
- Mazda RX8 hacking / reverse engineering notes and example code☆26Mar 1, 2022Updated 3 years ago
- Port of the classic first-person-shooter DOOM to Xbox for DEFCON 27 CTF☆26Aug 20, 2019Updated 6 years ago
- Teleporter is a simple application for sending files from Point A to Point B☆34Feb 27, 2023Updated 2 years ago
- ASLREKT is a proof of concept for an unfixed generic local ASLR bypass in Linux.☆26Feb 10, 2020Updated 6 years ago
- Linux Kernel N-day Exploit/Analysis.☆67Oct 21, 2024Updated last year
- FSOP Again☆32Apr 3, 2022Updated 3 years ago
- A collection of some useful Ghidra scripts☆34May 23, 2021Updated 4 years ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆29Nov 20, 2021Updated 4 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- ☆27May 25, 2022Updated 3 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆59Dec 7, 2021Updated 4 years ago
- A thorough library database to assist with binary exploitation tasks.☆194Aug 1, 2022Updated 3 years ago
- ☆35Oct 25, 2021Updated 4 years ago
- Tool to view heap chunks and memory writes (using pintool)☆42Dec 8, 2018Updated 7 years ago
- Binary Ninja plugin & workflow to help analyze Objective-C code☆84Jul 11, 2022Updated 3 years ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆469Apr 13, 2024Updated last year
- Repo to archive the 2019 RITSEC CTF Challenges & Documentation☆33Aug 26, 2020Updated 5 years ago