jeap, exploit 10 in 0ctf 2016 quals
☆15Mar 14, 2016Updated 9 years ago
Alternatives and similar repositories for jeap
Users that are interested in jeap are comparing it to the libraries listed below
Sorting:
- ☆17May 13, 2019Updated 6 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- My CTF writeup☆26Mar 20, 2017Updated 8 years ago
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆40Dec 28, 2016Updated 9 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- specific fuzzers based on AFL and fuzzing results☆41Oct 22, 2016Updated 9 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated 10 months ago
- ☆15Jun 11, 2022Updated 3 years ago
- ☆11May 19, 2017Updated 8 years ago
- ☆13Jul 31, 2016Updated 9 years ago
- A Retargettable CFI implementation in LLVM. Authors: Joseph Battaglia and Oulin Yao☆18May 8, 2015Updated 10 years ago
- ☆15Nov 29, 2022Updated 3 years ago
- Watching the Flag☆15Dec 16, 2015Updated 10 years ago
- PoCs/Examples for my guest post on doar-e☆19Nov 27, 2014Updated 11 years ago
- DEAD - An archive of my solutions. I'm no longer sure it's wise to publish everything, so I won't be updating this.☆14Oct 1, 2016Updated 9 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- blog☆16Apr 27, 2020Updated 5 years ago
- Fork/mirror of Darcs repo for PyFlag (Forensic and Log Analysis GUI)☆36Oct 16, 2010Updated 15 years ago
- Huawei mate 7 TrustZone exploit☆109Aug 4, 2015Updated 10 years ago
- ELF parser library implemented in pure Ruby!☆45Nov 1, 2025Updated 4 months ago
- ctf writeups☆19Sep 4, 2018Updated 7 years ago
- 0CTF 2015 Final web problem☆16Apr 27, 2015Updated 10 years ago
- Hacky little regexp compiler using LLVM☆17Feb 3, 2017Updated 9 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆29Jul 1, 2013Updated 12 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- GATEKEEPER: Inline and on-target defense☆123Sep 1, 2022Updated 3 years ago
- my public code☆167Jan 11, 2017Updated 9 years ago
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- RISCV-V disassembler for IDA Pro☆25Mar 26, 2017Updated 8 years ago
- Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.☆19Mar 4, 2016Updated 9 years ago
- ☆21Nov 7, 2016Updated 9 years ago
- use afl to fuzz swift program☆24Nov 3, 2017Updated 8 years ago
- Remote kernel exploit for ROSE amateur radio☆24Aug 8, 2011Updated 14 years ago
- cve2014-3153 exploit for ubuntu x86☆18Jan 24, 2015Updated 11 years ago
- WTF are those magic numbers?!!☆33Dec 20, 2021Updated 4 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆52Apr 7, 2016Updated 9 years ago
- A crappy tool used in our private PS4 jailbreak☆99Oct 27, 2016Updated 9 years ago