☆53May 13, 2024Updated last year
Alternatives and similar repositories for webp-CVE-2023-4863
Users that are interested in webp-CVE-2023-4863 are comparing it to the libraries listed below
Sorting:
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- A C-based checksec without readelf or grep dependance.☆11Apr 20, 2021Updated 4 years ago
- GitHub Pages☆14Nov 24, 2025Updated 3 months ago
- Custom Agent and Tooling for using Nyx with Firefox☆22Jul 23, 2025Updated 7 months ago
- ☆34Apr 14, 2025Updated 11 months ago
- .NET deserialization hunter☆89Jul 21, 2024Updated last year
- GitHub Pages for Kernel Self Protection Project☆23Nov 8, 2025Updated 4 months ago
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- Bring your own Unwind Data Framework☆77Updated this week
- Sample Binary Ninja Plugin☆22Jun 11, 2023Updated 2 years ago
- All challenges from DiceCTF @ HOPE 2022☆28Jul 25, 2022Updated 3 years ago
- ☆21May 19, 2022Updated 3 years ago
- 🚩 framework for kernel memory exploitation (WIP)☆22Jul 22, 2025Updated 7 months ago
- An attempt to reverse engineer custom file formats used by the game Outlaws from LucasArts.☆16Nov 3, 2018Updated 7 years ago
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- VTable dumper for IDA 7.7+☆19Jun 19, 2025Updated 9 months ago
- Deterministic record and replay and tracing of syzkaller bug reproducers☆20Apr 25, 2025Updated 10 months ago
- Insecurity as an IOService☆96Mar 25, 2025Updated 11 months ago
- ☆22Sep 26, 2023Updated 2 years ago
- My collection of PoCs☆26Nov 9, 2023Updated 2 years ago
- Welcome to Hoyt's macOS Fuzzing & Code Repo. Contribute Code or Open an Issue or Discussion.☆50Feb 8, 2026Updated last month
- a7 sep bug☆55Sep 26, 2023Updated 2 years ago
- Terminal-based IDA disassembly, microcode and pseudocode dumper☆44Mar 11, 2026Updated last week
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆15Feb 12, 2025Updated last year
- collection of V8 design documents☆81Jan 4, 2026Updated 2 months ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆151Apr 26, 2024Updated last year
- Abusing exceptions for code execution.☆113Jan 30, 2023Updated 3 years ago
- Bootloader exploration☆20Feb 22, 2022Updated 4 years ago
- ☆58Jan 29, 2024Updated 2 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 2 months ago
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- this is a repository for MIPS tools.You can find some statically linked tools like GDB\TCPDUMP\GDBSERVER, which can used for IOT security…☆10Nov 20, 2020Updated 5 years ago
- ☆21Feb 20, 2014Updated 12 years ago
- My CTF tools & some other stuff☆20Aug 12, 2024Updated last year
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- Exploit code for CVE-2016-9066☆45Mar 19, 2017Updated 9 years ago
- ☆26Sep 21, 2022Updated 3 years ago
- My Chrome and Safari exploit code + write-up repo☆532Nov 5, 2021Updated 4 years ago