Lazenca / Exploit-techLinks
Example files to experience basic exploit techniques.
☆75Updated 6 years ago
Alternatives and similar repositories for Exploit-tech
Users that are interested in Exploit-tech are comparing it to the libraries listed below
Sorting:
- ☆135Updated 6 years ago
- Windows Graphics Device Interface (GDI+) fuzzer☆130Updated 5 years ago
- New improved corpus distillation toolset that has helped to found tens of vulnerabilities in MS and Adobe products☆56Updated 6 years ago
- ☆68Updated last year
- CTF binary exploit code☆37Updated 6 years ago
- HITCON CTF 2018☆46Updated 7 years ago
- two heap address leak bugs in `usosvc` service☆89Updated 5 years ago
- Web user interface and service agent for the monitoring and remote management of WinAFL.☆61Updated last week
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆69Updated 7 years ago
- ☆52Updated 4 years ago
- Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf☆60Updated 6 years ago
- ☆154Updated 7 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆95Updated 4 years ago
- Windows EoP Bugs☆127Updated 5 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆73Updated 8 years ago
- ☆36Updated 7 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆112Updated 6 years ago
- ☆200Updated 2 years ago
- ☆100Updated 7 years ago
- 3D Accelerated Exploitation☆53Updated 6 years ago
- Automatic ROPChain Generation☆294Updated 5 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆47Updated 5 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆14Updated 5 years ago
- a list of web browser vulnerabilities☆20Updated 5 years ago
- WCTF 2019 challenge☆103Updated 6 years ago
- ☆89Updated 7 years ago
- ☆86Updated 2 years ago
- ☆22Updated 6 years ago
- My conference presentations and Materials for them.☆33Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 5 years ago