DefconRome / meetings-2019View external linksLinks
Slides and stuffs of the meetings during the 2019
☆33Jan 18, 2022Updated 4 years ago
Alternatives and similar repositories for meetings-2019
Users that are interested in meetings-2019 are comparing it to the libraries listed below
Sorting:
- Collection of DBI evasion techniques☆16Jan 25, 2022Updated 4 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- Code for the "Predictive Context-sensitive Fuzzing" NDSS'24 paper☆30Feb 29, 2024Updated last year
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Nov 26, 2016Updated 9 years ago
- Lecture notes for Advanced Operating Systems and Virtualization course at Sapienza University of Rome☆22Mar 8, 2019Updated 6 years ago
- An unofficial and open source client for Sapienza University's Infostud☆10Mar 6, 2023Updated 2 years ago
- A quick String < - > HEX tool for Windows with Drag & Drop and File saving☆10Dec 4, 2018Updated 7 years ago
- The Zonemaster GUI - part of the Zonemaster project☆17Updated this week
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆50Apr 6, 2018Updated 7 years ago
- ☆12May 6, 2020Updated 5 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- A framework for finding completeness bugs in optimizing compiler toolchains.☆23Mar 4, 2024Updated last year
- RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using…☆27Sep 10, 2019Updated 6 years ago
- This is an example library to show how to fuzz with AFL++ only the code modified by the last commit.☆17Mar 2, 2020Updated 5 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 8 years ago
- Notes for the Cryptography course at Sapienza☆12Jun 24, 2020Updated 5 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Jul 8, 2019Updated 6 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- z64 Simulator☆19Nov 26, 2024Updated last year
- A quick-and-easy web CTF platform for people who love ASCII and minimalism.☆13Jun 20, 2021Updated 4 years ago
- rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. It is open-source and has been tested …☆11Apr 2, 2016Updated 9 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Aug 22, 2018Updated 7 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆128Dec 22, 2021Updated 4 years ago
- Proof of Concept of TrustZone exploit☆16Aug 10, 2025Updated 6 months ago
- clang-based search engine for C/C++ data structures, classes, prototypes & macros☆103Jul 15, 2025Updated 6 months ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- Constantine is a compiler-based system to automatically harden programs against microarchitectural side channels☆82Nov 3, 2025Updated 3 months ago
- ☆17Oct 26, 2018Updated 7 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆138Nov 18, 2019Updated 6 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Aug 9, 2019Updated 6 years ago
- About as basic of a mutator as you can get, but it does the trick in most situations☆64Aug 12, 2020Updated 5 years ago
- A simple library focusing on demangling symbols for different programing languages☆48Dec 9, 2020Updated 5 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Feb 1, 2026Updated last week
- A Linux x86_64 ELF loader in user-space written in Rust☆39Nov 28, 2020Updated 5 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago