Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Gargoyle | 384 | 7 years ago | 1 | agpl-3.0 | C++ | |||||
A memory scanning evasion technique | ||||||||||
Ropium | 314 | 2 years ago | 8 | March 17, 2018 | 4 | C++ | ||||
ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together | ||||||||||
Learn Binary Hacking | 207 | 4 months ago | cc0-1.0 | Python | ||||||
Binary Hacking Study Notes | ||||||||||
Pwnshop | 144 | 4 years ago | 2 | Python | ||||||
Exploit Development, Reverse Engineering & Cryptography | ||||||||||
Compsec | 41 | 9 months ago | 11 | mit | Python | |||||
Exercises for (legacy) Computer Security course in the University of Oulu | ||||||||||
Ctf Writeup | 31 | 4 years ago | Python | |||||||
Rop Benchmark | 29 | a year ago | 2 | Python | ||||||
ROP Benchmark is a tool to compare ROP compilers | ||||||||||
Rop Intro And Foreland | 18 | 8 years ago | ||||||||
Security introduction book | ||||||||||
Exploitation_docker | 8 | 2 years ago | gpl-3.0 | Python | ||||||
Docker container with exploitation technique examples, used in my master thesis | ||||||||||
Tagged_security_riscv | 6 | 7 years ago | other | C | ||||||
Implementation of Tagged Memory security policies into Rocket Core |