RischardV / emoji-shellcodingLinks
π€© Emoji shellcoding tools for RISC-V (32-bit and 64-bit)
β176Updated last month
Alternatives and similar repositories for emoji-shellcoding
Users that are interested in emoji-shellcoding are comparing it to the libraries listed below
Sorting:
- β206Updated 10 months ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasionsβ169Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.β147Updated 2 years ago
- Binary Golf Grand Prixβ113Updated last year
- An automatic Blind ROP exploitation toolβ203Updated 2 years ago
- ASLR bypass without infoleakβ160Updated 3 years ago
- Comprehensive toolkit for Ghidra headless.β359Updated 5 months ago
- Ghidra scripts for recovering string definitions in Go binariesβ118Updated 10 months ago
- CVE-2023-4911 proof of conceptβ168Updated last year
- Binary Golf Grand Prixβ61Updated 6 months ago
- β51Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86β¦β139Updated 2 years ago
- β127Updated last year
- Slides & Hands-on for the reverse engineering workshopβ183Updated 2 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.β105Updated 7 months ago
- β49Updated 3 years ago
- β216Updated last year
- Write ups for Ph0wn CTFβ46Updated last month
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerabilityβ220Updated last year
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was βRaβ¦β41Updated last year
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USAβ40Updated 2 years ago
- Hack-A-Sat Qualifiers Writeupsβ256Updated 2 years ago
- β128Updated 10 months ago
- β104Updated 8 months ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.β55Updated 3 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Exampleβ117Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.β163Updated 10 months ago
- Local privilege escalation PoC for Linux kernel CVE-2022-1015β202Updated 3 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.β26Updated 3 years ago
- Binary & scripts associated with "The Poor Man's Obfuscator" presentationβ228Updated 3 years ago