CheckPointSW / QueryOrientedProgrammingLinks
Query Oriented Programming (QOP) gadgets for SQLite-based exploitation
☆49Updated 3 years ago
Alternatives and similar repositories for QueryOrientedProgramming
Users that are interested in QueryOrientedProgramming are comparing it to the libraries listed below
Sorting:
- Dockerfiles for (un)popular fuzzers!☆29Updated 5 years ago
- Fork Free Fail Repeat☆48Updated 3 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated 2 weeks ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 5 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- ☆99Updated 6 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆68Updated 5 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- A user-friendly fuzzing and crash triage tool for Windows☆131Updated 5 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- Radare 2 wiki☆92Updated 5 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Generate very tiny reverse shell binaries for Linux~☆75Updated 5 years ago
- A tool for finding the one gadget RCE in libc☆76Updated 5 years ago
- ☆90Updated 6 years ago
- Materials from Fuzzing Bay Area meetups☆68Updated 5 years ago
- Format string exploitation helper☆45Updated 9 years ago
- Automation framework for attack-defense CTFs.☆15Updated 5 years ago
- Backwards program slice stitching for automatic CTF problem solving.☆52Updated 6 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆71Updated 8 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- ☆44Updated 6 years ago
- Find strings in Go binaries☆53Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- ☆97Updated 3 years ago