VincentDary / PolyAsciiShellGen
Caezar ASCII Shellcode Generator (x86, 32 bits)
☆31Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for PolyAsciiShellGen
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆80Updated 5 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Updated 5 years ago
- WCTF 2019 challenge☆99Updated 5 years ago
- a IDA 7.0 plugins that helps to attach process created by pwntools and debug pwn☆67Updated last year
- 2019 Advent Calendar, vmware pwnables☆49Updated 4 years ago
- All virtualization escape challenges and writeups in RealWorldCTF☆86Updated 5 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆64Updated 3 years ago
- ☆152Updated 5 years ago
- WCTF 2019 Onsite(Master) Challenge☆52Updated 5 years ago
- Various debugging tools such as %DumpObjects for v8☆53Updated 5 years ago
- Heap exploitation technique bypassing heap ASLR☆47Updated 5 years ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆88Updated 6 years ago
- ☆67Updated 8 months ago
- Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf☆60Updated 5 years ago
- ☆171Updated 5 years ago
- 👀Dynamic memory watcher/tracer/analyzer for CTF pwn☆52Updated 4 years ago
- ☆41Updated 2 years ago
- Yet another xinetd docker used to build pwnable challenges.☆36Updated 5 years ago
- linux system call hook framework☆47Updated 5 years ago
- adobe afdko fuzz☆41Updated 5 years ago
- Kernel driver to fuzz Hyper-V hypercalls☆135Updated 5 years ago
- Fuzzing library written in/for python.☆84Updated 4 years ago
- ☆27Updated last month
- Something about CTF and vulnerability environment, mainly about kernel exploit.☆46Updated 2 years ago