FreeJaus / gea-PRISM
PRISM Autonomous Experimentation Group
☆12Updated 7 years ago
Alternatives and similar repositories for gea-PRISM:
Users that are interested in gea-PRISM are comparing it to the libraries listed below
- An introduction course to system exploitation based on pwnable.kr challenges☆21Updated this week
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆11Updated 4 years ago
- https://exploit.courses/☆19Updated 6 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- HTTP Desync Attack☆28Updated 4 years ago
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆58Updated last year
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆14Updated 2 years ago
- Automatically exported from code.google.com/p/narly☆22Updated 3 years ago
- Script(s) to assist with the setup of WinDBG & mona.py on a Windows 10 VM☆26Updated 2 years ago
- The Dumb Network Fuzzer☆19Updated last year
- ☆30Updated 2 years ago
- ☆15Updated 4 years ago
- TAODOS stands for The Art of Denial-of-Service☆16Updated 3 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- Procscan is a quick and dirty python script used to look for potentially dangerous api call patterns in a Procmon PML file.☆11Updated 2 years ago
- ☆20Updated 5 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 4 years ago
- ☆21Updated 4 years ago
- ☆14Updated 2 years ago
- ☆14Updated 5 years ago
- Slides and other material from various conference presentations.☆40Updated 3 years ago
- Analysis of VBS exploit CVE-2018-8174☆30Updated 6 years ago
- My attempt at writing exploit POCs for various CVEs☆16Updated 5 years ago
- My fuzzing workshop from PHDays9☆27Updated 5 years ago
- Simple WebSocket fuzzer☆31Updated last year
- Proof of Concept's provided by Source Incite☆37Updated 7 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆37Updated 2 months ago