ThomasKing2014 / slidesLinks
☆60Updated 6 months ago
Alternatives and similar repositories for slides
Users that are interested in slides are comparing it to the libraries listed below
Sorting:
- ☆90Updated 2 years ago
- PoC code for CVE-2019-14040☆26Updated 5 years ago
- CTF Write-ups☆29Updated 4 years ago
- Research related☆89Updated 3 years ago
- 2019 Advent Calendar, vmware pwnables☆50Updated 4 years ago
- ☆103Updated 5 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- exploit code for a bpf heap overflow vulnerability☆27Updated 5 years ago
- ☆34Updated 4 years ago
- Various debugging tools such as %DumpObjects for v8☆55Updated 6 years ago
- android kernel pwn☆20Updated 6 years ago
- blog☆16Updated 5 years ago
- Hybrid Interface Aware Fuzz for Android Kernel Drivers☆31Updated 4 years ago
- Driver Security Analyzer☆52Updated 4 years ago
- ☆28Updated 2 years ago
- ☆46Updated 3 years ago
- qemu vulnerablity.☆53Updated 4 years ago
- USB device fuzzing on Android Phone☆31Updated 3 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 5 months ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Updated 5 years ago
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆90Updated 2 years ago
- ☆58Updated 4 years ago
- An IDA file loader for Mobicore trustlet and driver binaries☆60Updated 5 years ago
- Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf☆61Updated 6 years ago
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆123Updated 3 years ago
- adobe afdko fuzz☆41Updated 5 years ago
- Qemu Fuzzer.针对Qemu模拟设备的模糊测试工具,主要思路是Host生成种子Data,然后传递给Guest中转程序,由中转程序访问MMIO,以达到和模拟设备的交互,不同于qtest自带的fuzzer.☆44Updated 3 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Updated 6 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago