abazhaniuk / PublicationsLinks
Slides, Papers, Links to CVEs and advisories
☆77Updated 8 years ago
Alternatives and similar repositories for Publications
Users that are interested in Publications are comparing it to the libraries listed below
Sorting:
- ☆49Updated 9 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Updated 10 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 9 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- PoC for CVE-2015-6086☆67Updated 9 years ago
- ARM Shellcode Generator☆103Updated 8 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago
- Black Hat 2016 Slides, Paper and Code☆82Updated 9 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Updated 8 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55Updated 9 years ago
- ☆52Updated 9 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- r2con 2017 September 6-9☆97Updated 8 years ago
- Radare 2 wiki☆93Updated 5 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 8 years ago
- ☆79Updated 9 years ago
- slide and full exploit☆87Updated 5 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 9 years ago
- Verification Validation and Visualization of Security Policy Abstractions☆45Updated 2 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Updated 9 years ago
- ☆49Updated 7 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 9 years ago
- ARM rop chain gadget searcher☆38Updated 8 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆145Updated 9 years ago
- ☆38Updated 10 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 8 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Updated 7 years ago
- Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1☆76Updated 9 years ago
- Arm Episodes☆78Updated 7 years ago