abazhaniuk / Publications
Slides, Papers, Links to CVEs and advisories
☆78Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for Publications
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 13 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆50Updated 8 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆67Updated 11 years ago
- SIGSTOPing ELF binaries since 0x7E1☆50Updated 3 months ago
- PoC for CVE-2015-6086☆67Updated 8 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 7 years ago
- ☆38Updated 9 years ago
- Block-based software vulnerability fuzzing framework☆47Updated 5 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 7 years ago
- ☆24Updated 9 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆36Updated 9 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 7 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆81Updated 7 years ago
- Intel Management Engine firmware loader plugin for IDA☆90Updated 7 years ago
- ARM rop chain gadget searcher☆37Updated 7 years ago
- ☆49Updated 6 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 7 years ago
- slide and full exploit☆86Updated 4 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆143Updated 8 years ago
- ☆114Updated 7 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆43Updated 8 years ago
- lte security☆41Updated 9 years ago
- r2con 2017 September 6-9☆97Updated 7 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆41Updated 8 years ago
- Use CVE-2016-3308 corrupt win32k desktop heap☆50Updated 8 years ago