nearffxx's Stars
apple/darwin-xnu
Legacy mirror of Darwin Kernel. Replaced by https://github.com/apple-oss-distributions/xnu
lunixbochs/patchkit
binary patching from Python
MaskRay/ccls
C/C++/ObjC language server supporting cross references, hierarchies, completion and semantic highlighting
nongiach/arm_now
arm_now is a qemu powered tool that allows instant setup of virtual machines on arm cpu, mips, powerpc, nios2, x86 and more, for reverse, exploit, fuzzing and programming purpose.
bkth/34c3ctf
infinite-horizon219/Unix-Privilege-Escalation-Exploits-Pack
Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.
timwr/CVE-2016-5195
CVE-2016-5195 (dirtycow/dirtyc0w) proof of concept for Android
nccgroup/SusanRTTI
Another RTTI Parsing IDA plugin
k8tems/ctf_writeups
navdeep-G/samplemod
joxeankoret/diaphora
Diaphora, the most advanced Free and Open Source program diffing tool.
arisada/midgetpack
midgetpack is a multiplatform secure ELF packer
Hvass-Labs/TensorFlow-Tutorials
TensorFlow Tutorials with YouTube Videos
OpenToAllCTF/pwnvm
Setup for a pwning VM
hugsy/cemu
Cheap EMUlator: lightweight multi-architecture assembly playground
apenwarr/sshuttle
Wrong project! You should head over to http://github.com/sshuttle/sshuttle
mfontanini/Programs-Scripts
The tiny programs and scripts that don't deserve a project, but I still want to share.
Fuzion24/AndroidKernelExploitationPlayground
bkth/babyfengshui
33C3 CTF binary challenge
sciencemanx/ftrace
trace local function calls like strace and ltrace
nelhage/ministrace
A minimal toy implementation of strace(1)
cormander/tpe-lkm
Trusted Path Execution (TPE) Linux Kernel Module
zardus/preeny
Some helpful preload libraries for pwning stuff.
andrew-d/static-binaries
Various *nix tools built as statically-linked binaries
mncoppola/Linux-Kernel-CTF
Helper scripts for hosting a Linux kernel exploitation CTF challenge
android-rpi/device_brcm_rpi2
android-rpi/local_manifests
Android on Raspberry Pi : Entry-Point
isislovecruft/library
The papers and books I've read or am about to read.