Geluchat / v8_dll_resolver
A javascript dll resolver for v8
☆12Updated 4 years ago
Alternatives and similar repositories for v8_dll_resolver:
Users that are interested in v8_dll_resolver are comparing it to the libraries listed below
- ☆27Updated 5 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆31Updated 4 years ago
- ☆18Updated 5 years ago
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆15Updated 4 years ago
- Write-ups for crackmes and CTF challenges☆51Updated 2 years ago
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Updated last year
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- The Dumb Network Fuzzer☆20Updated last year
- Super IOCTL Basic Fuzzer☆15Updated 5 years ago
- ☆20Updated 5 years ago
- Flare-On solutions☆36Updated 5 years ago
- r2con 2020 CTF kernel challenge☆12Updated 4 years ago
- A collection of various exploits☆28Updated 7 months ago
- Radare2 Metadata Extraction to Elasticsearch☆22Updated 11 months ago
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 7 years ago
- A library for patching ELFs☆55Updated 4 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 6 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆42Updated 5 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- #INFILTRATE20 raptor's party pack.☆28Updated last year
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 9 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year