Slides and stuffs of the meetings during the 2019
☆33Jan 18, 2022Updated 4 years ago
Alternatives and similar repositories for meetings-2019
Users that are interested in meetings-2019 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Slides and stuffs of the meetings during the 2018☆13Jan 18, 2022Updated 4 years ago
- Collection of DBI evasion techniques☆16Jan 25, 2022Updated 4 years ago
- Group coding repository of PltCov, a tool to instrument ELF binaries for fuzzing with ngram coverage of imported APIs☆12Jan 18, 2022Updated 4 years ago
- Code for the "Predictive Context-sensitive Fuzzing" NDSS'24 paper☆30Feb 29, 2024Updated 2 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A framework for finding completeness bugs in optimizing compiler toolchains.☆23Mar 4, 2024Updated 2 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- ☆12May 6, 2020Updated 5 years ago
- RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using…☆27Sep 10, 2019Updated 6 years ago
- A quick-and-easy web CTF platform for people who love ASCII and minimalism.☆14Jun 20, 2021Updated 4 years ago
- Lecture notes for Advanced Operating Systems and Virtualization course at Sapienza University of Rome☆22Mar 8, 2019Updated 7 years ago
- An unofficial and open source client for Sapienza University's Infostud☆10Mar 6, 2023Updated 3 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆50Apr 6, 2018Updated 8 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆128Dec 22, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Feb 3, 2021Updated 5 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Mar 16, 2023Updated 3 years ago
- Timeless debugging with symbolic execution and processor trace☆75Jan 23, 2021Updated 5 years ago
- z64 Simulator☆19Nov 26, 2024Updated last year
- Ghidra Emulates Functions☆57Oct 13, 2020Updated 5 years ago
- Proof of Concept of TrustZone exploit☆16Aug 10, 2025Updated 8 months ago
- clang-based search engine for C/C++ data structures, classes, prototypes & macros☆103Apr 3, 2026Updated last week
- rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. It is open-source and has been tested …☆11Apr 2, 2016Updated 10 years ago
- ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.☆28Feb 3, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- ☆157Jun 15, 2022Updated 3 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆204Jul 22, 2020Updated 5 years ago
- This is the home of the raindrop obfuscator. It transforms program functions into obfuscated ROP chains that coexist seamlessly with the …☆65Aug 11, 2021Updated 4 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- About as basic of a mutator as you can get, but it does the trick in most situations☆65Aug 12, 2020Updated 5 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆11Dec 4, 2018Updated 7 years ago
- HN Security's advisories.☆22Nov 7, 2025Updated 5 months ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Nov 26, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Some Rust bindings for Binary Ninja☆31Oct 4, 2023Updated 2 years ago
- ☆19Dec 9, 2022Updated 3 years ago
- just an experiment☆22Sep 5, 2018Updated 7 years ago
- A new type of js fuzzer☆26Feb 10, 2020Updated 6 years ago
- Exploit for CVE-2023-38571☆13Sep 27, 2023Updated 2 years ago
- Notes for the Cryptography course at Sapienza☆12Jun 24, 2020Updated 5 years ago
- Tutorial on Symbolic Execution. Hands-on session is based on the angr framework.☆134May 14, 2021Updated 4 years ago