Fare9 / RicardoNarvajaCppExercise
Solution for Ricardo Narvaja's C++ Exploiting Exercise
☆13Updated 5 years ago
Alternatives and similar repositories for RicardoNarvajaCppExercise:
Users that are interested in RicardoNarvajaCppExercise are comparing it to the libraries listed below
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 2 years ago
- ☆36Updated 5 years ago
- Flare-On solutions☆36Updated 5 years ago
- Win32k Elevation of Privilege Poc☆0Updated 5 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- ☆24Updated 5 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆20Updated 5 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- Universal Malware Sample Encryption☆10Updated last year
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆15Updated 4 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 5 years ago
- Go Lang Portable Executable Parser☆38Updated 3 years ago
- ☆22Updated 3 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Small fuzzing library with an example script using it.☆20Updated 3 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- SDBbot Unpacker Python 2.7☆9Updated 4 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆17Updated 5 years ago
- ☆27Updated 5 years ago
- ☆13Updated 5 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 6 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 8 years ago