RischardV / emoji-shellcodingLinks
π€© Emoji shellcoding tools for RISC-V (32-bit and 64-bit)
β176Updated 2 months ago
Alternatives and similar repositories for emoji-shellcoding
Users that are interested in emoji-shellcoding are comparing it to the libraries listed below
Sorting:
- An automatic Blind ROP exploitation toolβ204Updated 2 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasionsβ169Updated last year
- β205Updated 11 months ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.β147Updated 2 years ago
- Comprehensive toolkit for Ghidra headless.β359Updated 5 months ago
- ASLR bypass without infoleakβ160Updated 3 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86β¦β139Updated 2 years ago
- CVE-2023-4911 proof of conceptβ168Updated last year
- Binary Golf Grand Prixβ61Updated 6 months ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.β26Updated 3 years ago
- β213Updated last year
- β128Updated last year
- β51Updated last year
- Ghidra scripts for recovering string definitions in Go binariesβ119Updated 10 months ago
- β49Updated 3 years ago
- Binary Golf Grand Prixβ113Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerabilityβ220Updated last year
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binariesβ¦β196Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.β164Updated 10 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.β102Updated 8 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USAβ40Updated 2 years ago
- Local privilege escalation PoC for Linux kernel CVE-2022-1015β202Updated 3 years ago
- Automated solver of classic CTF pwn challenges, with flexibility in mind.β61Updated 3 years ago
- Proof-of-Concept for CVE-2023-38146 ("ThemeBleed")β199Updated 2 years ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.β55Updated 3 years ago
- β243Updated 3 years ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injectionβ126Updated 4 months ago
- Kernel exploitation techniqueβ578Updated last year
- Code snippets for Reverse engineering training for xtraining platformβ33Updated 2 years ago
- Slides & Hands-on for the reverse engineering workshopβ183Updated 2 years ago