GetHip-Zach / GetHIP
☆9Updated 9 years ago
Alternatives and similar repositories for GetHIP
Users that are interested in GetHIP are comparing it to the libraries listed below
Sorting:
- Native binary for testing Android phones for the Rowhammer bug☆487Updated 6 years ago
- Repository to train/learn memory corruption on the ARM platform.☆353Updated 8 years ago
- Files from my DEFCON CTF VM.☆270Updated 8 years ago
- ☆280Updated 4 years ago
- ☆18Updated 2 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆324Updated 9 years ago
- ☆561Updated 6 years ago
- random brain dumps☆347Updated 7 years ago
- Aggregation of home APIs into one simple webapp☆9Updated 6 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Updated 9 years ago
- Training materials crafted and publicly provided by Red Naga members☆432Updated 7 years ago
- Deprecated Binary Ninja prototype written in Python☆523Updated 4 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2013☆230Updated 9 years ago
- Documentation for the Mechanical Phish.☆233Updated 8 years ago
- A tool to help you write binary exploits☆611Updated 6 years ago
- Simplify format string exploitation.☆339Updated 3 years ago
- Exercises for learning Reverse Engineering and Exploitation.☆384Updated 6 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆233Updated 2 months ago
- LASACTF Problem Source☆13Updated 8 years ago
- ☆40Updated 10 years ago
- Build your own IP Attack Maps with SOUND!☆1,045Updated last year
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆286Updated 8 years ago
- Release Branches for MoFlow☆304Updated 9 years ago
- Metaphor - Stagefright with ASLR bypass☆314Updated 9 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,106Updated 3 years ago
- A tool to retrieve malware directly from the source for security researchers.☆563Updated 7 years ago
- 2016 DEF CON Qualifier Challenges☆179Updated 8 years ago
- Previously-0day exploit from the Hacking Team leak, written by Eugene Ching/Qavar.☆199Updated 9 years ago
- The first open source vulnerability scanner for firmwares☆195Updated 8 years ago
- The iCTF Framework, presented by Shellphish!☆334Updated 2 years ago