aemmitt-ns / radius2-examples
examples of using radius2 to solve reversing challenges
☆35Updated 4 months ago
Alternatives and similar repositories for radius2-examples:
Users that are interested in radius2-examples are comparing it to the libraries listed below
- ☆23Updated 3 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆98Updated 2 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated last month
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- Ansible build for Afl++ Frida-Mode☆23Updated 10 months ago
- ☆36Updated 4 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 2 months ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 4 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated 11 months ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆115Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆73Updated 4 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated 10 months ago
- ☆80Updated 8 months ago
- ☆59Updated last year
- V8sandbox_bypass using stack misalignment☆19Updated 8 months ago
- How to retro theme your Ghidra☆35Updated 6 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated 11 months ago
- CVE-2024-30090 - LPE PoC☆106Updated 6 months ago
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆25Updated 7 months ago
- ☆34Updated 11 months ago
- Leveraging patch diffing to discover new vulnerabilities☆119Updated 6 months ago
- ☆16Updated 2 weeks ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆58Updated 6 months ago
- list of organizations offering vulnerability research/reverse engineering jobs☆63Updated last month
- ☆45Updated last month
- Industrial IR-based static analysis framework for Java bytecode☆9Updated last year
- Resolve symbols from release rust binaries on Windows☆20Updated last year
- Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge☆64Updated 4 months ago
- ysoserial.net docker image☆28Updated 7 months ago
- ☆50Updated 6 years ago