Lazenca / Exploit-techLinks
Example files to experience basic exploit techniques.
☆74Updated 6 years ago
Alternatives and similar repositories for Exploit-tech
Users that are interested in Exploit-tech are comparing it to the libraries listed below
Sorting:
- ☆135Updated 5 years ago
- Windows EoP Bugs☆128Updated 5 years ago
- Web user interface and service agent for the monitoring and remote management of WinAFL.☆54Updated last week
- CTF binary exploit code☆38Updated 6 years ago
- Windows Graphics Device Interface (GDI+) fuzzer☆129Updated 4 years ago
- New improved corpus distillation toolset that has helped to found tens of vulnerabilities in MS and Adobe products☆55Updated 5 years ago
- ☆68Updated last year
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 7 years ago
- HITCON CTF 2018☆45Updated 6 years ago
- two heap address leak bugs in `usosvc` service☆93Updated 4 years ago
- ☆50Updated 3 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆94Updated 3 years ago
- ☆198Updated 2 years ago
- Automatic ROPChain Generation☆291Updated 5 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆14Updated 5 years ago
- ☆154Updated 6 years ago
- Analysis of VBS exploit CVE-2018-8174☆31Updated 7 years ago
- ☆85Updated last year
- Solutions for ROP Emporium challenges (https://ropemporium.com/) in python.☆39Updated 7 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆139Updated 4 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆47Updated 4 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- ☆36Updated 6 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆111Updated 6 years ago
- ☆33Updated 5 years ago
- My conference presentations and Materials for them.☆32Updated 2 years ago
- ☆99Updated 6 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf☆61Updated 6 years ago
- September Chrome 1day by István Kurucsai☆82Updated 5 years ago