RealJTG / MeltdownLinks
Meltdown PoC for reading passwords from Google Chrome.
☆471Updated 8 years ago
Alternatives and similar repositories for Meltdown
Users that are interested in Meltdown are comparing it to the libraries listed below
Sorting:
- Certified Edible Dinosaurs official CTF toolkit☆120Updated 7 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- Radare 2 wiki☆93Updated 5 years ago
- ☆92Updated last year
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆105Updated 9 years ago
- Writeups for CTF competitions.☆33Updated 9 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Updated 6 years ago
- ☆100Updated 7 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆119Updated 7 years ago
- A Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.☆104Updated 5 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Updated 12 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 8 years ago
- ☆92Updated 7 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 9 years ago
- Miscellanous scripts used for malware analysis☆23Updated 7 years ago
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Updated 8 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- various CTF writeups☆61Updated 7 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆217Updated 8 years ago
- ☆43Updated 7 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- some tasks/solutions from CTF challenges☆68Updated 9 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Updated 7 years ago
- ☆40Updated 8 years ago
- PoC for Foxit Reader CVE-2018-14442☆58Updated 7 years ago
- ☆20Updated 7 years ago
- windows kernel vulnerability found by me☆90Updated 8 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago