DefconRome / meetings-2018
Slides and stuffs of the meetings during the 2018
☆13Updated 3 years ago
Alternatives and similar repositories for meetings-2018:
Users that are interested in meetings-2018 are comparing it to the libraries listed below
- Slides and stuffs of the meetings during the 2019☆33Updated 3 years ago
- Slides and stuffs of the meetings during the 2020.☆16Updated 3 years ago
- Solutions and write-ups to challenges from Pwny Racing☆24Updated 5 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- A gentle introduction to binary exploitation☆42Updated 4 years ago
- python and honggfuzz☆25Updated 4 years ago
- A curated list of awesome baseband research resources☆16Updated 5 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- ☆17Updated 4 years ago
- ☆20Updated 3 years ago
- defcon framework by SeoulPlusBadass☆18Updated 2 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 8 months ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 6 years ago
- PoC Exploit for AOSP UserDictionary Content Provider (CVE-2018-9375)☆21Updated 6 years ago
- ☆22Updated 6 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- ☆44Updated 6 years ago
- Reverse Engineering tool for Ethereum EVM☆19Updated 8 years ago
- Python module to help in exploitation of the FILE structure in C☆26Updated 6 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- Vagrant setup for building a machine for CTF/exploit development☆22Updated 6 years ago
- RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using…☆26Updated 5 years ago
- Group coding repository of PltCov, a tool to instrument ELF binaries for fuzzing with ngram coverage of imported APIs☆12Updated 3 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆109Updated 5 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆71Updated 7 years ago
- CSAW Embedded Security Challenge 2019☆34Updated 5 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆35Updated 4 years ago
- Dockerfiles for (un)popular fuzzers!☆29Updated 5 years ago
- Make ARM Shellcode Great Again☆62Updated 4 years ago