BestPig / libc-dbLinks
libc database (file in packages, hash, package files, symbols). Raw binary libc available on https://github.com/BestPig/libc-bin)
☆33Updated 4 months ago
Alternatives and similar repositories for libc-db
Users that are interested in libc-db are comparing it to the libraries listed below
Sorting:
- Linux Kernel Snapshot Fuzzer using KVM☆48Updated last year
- CFG and scripts for fuzzing the PHP interpreter with Domato☆28Updated 5 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆87Updated 3 years ago
- BSOD: Binary-only Scalable fuzzing Of device Drivers☆161Updated 3 years ago
- a IDA 7.0 plugins that helps to attach process created by pwntools and debug pwn☆72Updated 2 years ago
- harness for fuzzing with winafl. both public and my own which i have released.☆57Updated 4 years ago
- ☆22Updated 3 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆63Updated 3 years ago
- 2019 Advent Calendar, vmware pwnables☆50Updated 4 years ago
- All virtualization escape challenges and writeups in RealWorldCTF☆89Updated 6 years ago
- ☆46Updated 3 years ago
- A collection of curated resources and CVEs I use for research.☆106Updated 3 years ago
- ☆36Updated 6 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆122Updated 8 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆60Updated 2 years ago
- ☆21Updated 5 years ago
- ☆99Updated 6 years ago
- ☆98Updated 2 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Updated 6 years ago
- qemu vulnerablity.☆53Updated 4 years ago
- ☆58Updated 5 months ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆87Updated 6 years ago
- attachments for forum of RealWorld CTF 3rd☆42Updated 4 years ago
- My conference presentations and Materials for them.☆32Updated 2 years ago
- My Material for the HITB presentation☆35Updated 5 years ago
- ☆35Updated 4 years ago
- ☆26Updated 6 years ago
- The best vulnerable driver to learn how to exploit kernel vulnerability.☆31Updated 5 years ago
- 33C3 CTF binary challenge☆25Updated 8 years ago
- ☆154Updated 6 years ago