CheckPointSW / QueryOrientedProgrammingLinks
Query Oriented Programming (QOP) gadgets for SQLite-based exploitation
☆49Updated 3 years ago
Alternatives and similar repositories for QueryOrientedProgramming
Users that are interested in QueryOrientedProgramming are comparing it to the libraries listed below
Sorting:
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated last month
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 5 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆68Updated 5 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- Dockerfiles for (un)popular fuzzers!☆30Updated 5 years ago
- ☆92Updated 7 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆47Updated 4 years ago
- ☆52Updated 6 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆71Updated 8 years ago
- ☆99Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- ☆98Updated 3 years ago
- ☆135Updated 5 years ago
- LPE for CVE-2020-1054 targeting Windows 7 x64☆86Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- collection of verified Linux kernel exploits☆187Updated 4 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆89Updated 3 years ago
- List of real-world threats against endpoint protection software☆216Updated 7 months ago
- PoC for Foxit Reader CVE-2018-14442☆58Updated 6 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Updated 5 years ago
- Format string exploitation helper☆45Updated 9 years ago
- ☆20Updated 5 years ago