SecurityObscurity / cve-2015-0313Links
☆21Updated 10 years ago
Alternatives and similar repositories for cve-2015-0313
Users that are interested in cve-2015-0313 are comparing it to the libraries listed below
Sorting:
- Vulnerability research and development.☆25Updated 10 years ago
- ☆26Updated 9 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆22Updated 7 years ago
- ☆10Updated 9 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 9 years ago
- Shellcode tracer☆15Updated 9 years ago
- HitCon 2015 spartan 0day & exploit☆27Updated 9 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Updated 9 years ago
- ☆13Updated 8 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Updated 7 years ago
- black hat Asia 2017 Slides☆22Updated 8 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Updated 9 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 10 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Updated 9 years ago
- A Modern Approach☆10Updated 9 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Updated 8 years ago
- Fuzzer☆43Updated 10 years ago
- ☆15Updated 5 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- ☆15Updated 10 years ago
- ☆16Updated 9 years ago
- ☆14Updated 9 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Updated 8 years ago
- ☆49Updated 9 years ago
- A Browser Fuzzer for Vulnerbilities☆65Updated 10 years ago
- ☆25Updated 9 years ago
- IDAPython script for quick vulnerability analysis☆33Updated 11 years ago