Martin Clauß's repositories
syscall_number
This tool gives you the Linux system call number (32bit and 64bit x86) for a system call name (e.g., read, write, ...).
exim-rce-cve-2018-6789
This repository provides a learning environment to understand how an Exim RCE exploit for CVE-2018-6789 works.
linux-kernel-debugging
Easy to use environment to debug / explore the inner workings of the Linux kernel.
aflgo-libxml2-docker
This is a Docker-based AFLGo setup for the libxml2 example. It can also be used for other fuzz targets.
cwe_checker_ghidra
simple convenience script to run cwe_checker with podman/docker and create output for Ghidra
aflgo
Directed Greybox Fuzzing with AFL
AFLplusplus
The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
ansible-archlinux
Automated arch linux desktop environment
blahcat.github.io
Source code of
ebpfkit
ebpfkit is a rootkit powered by eBPF
fiware-orion
An implementation of the Publish/Subscribe Context Broker GE, providing NGSI interfaces.
how2heap
A repository for learning various heap exploitation techniques.
linux-kernel-exploitation
A collection of links related to Linux kernel security and exploitation
meg
Fetch many paths for many hosts - without killing the hosts
offensive-docker
Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
pwntools
CTF framework and exploit development library
rawhttp
A Go library for making HTTP requests with complete control
rtfd.io
Qiling Framework Documentation
socbed
A Self-Contained Open-Source Cyberattack Experimentation Testbed
virtme
An easy way to virtualize the running system
weggli
weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interesting functionality in large codebases.