CheckPointSW / QueryOrientedProgrammingLinks
Query Oriented Programming (QOP) gadgets for SQLite-based exploitation
☆50Updated 2 months ago
Alternatives and similar repositories for QueryOrientedProgramming
Users that are interested in QueryOrientedProgramming are comparing it to the libraries listed below
Sorting:
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 8 months ago
- Hardcore corruption of my execve() vulnerability in WSL☆217Updated 8 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆73Updated 8 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- A tool for finding the one gadget RCE in libc☆77Updated 5 years ago
- ☆135Updated 6 years ago
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 5 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆29Updated 8 years ago
- Fork Free Fail Repeat☆48Updated 4 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆86Updated 6 years ago
- ☆53Updated 6 years ago
- ☆100Updated 7 years ago
- General Research Repository - Only updated when I feel like it☆28Updated last year
- A user-friendly fuzzing and crash triage tool for Windows☆132Updated 6 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆69Updated 6 years ago
- ☆101Updated 4 years ago
- Slack bot for challenge management in large teams☆60Updated 3 years ago
- 👀Dynamic memory watcher/tracer/analyzer for CTF pwn☆51Updated 5 years ago
- ☆21Updated last year
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- ☆92Updated 8 years ago
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- PoC for Foxit Reader CVE-2018-14442☆58Updated 7 years ago
- collection of verified Linux kernel exploits☆190Updated 5 years ago
- A pwning environment, now on docker!☆18Updated 4 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Format string exploitation helper☆46Updated 10 years ago
- GDB + GEF cheatsheet for reversing binaries☆74Updated 2 years ago