alephsecurity / research
Research material and Proof-of-Concepts for Aleph Research Findings
☆88Updated 3 years ago
Alternatives and similar repositories for research:
Users that are interested in research are comparing it to the libraries listed below
- Capture The Flag Binary fuzzer for Heap challanges☆39Updated 6 years ago
- Make ARM Shellcode Great Again☆62Updated 3 years ago
- 3D Accelerated Exploitation☆54Updated 5 years ago
- exploit development☆49Updated 6 years ago
- For code snippets and information☆41Updated 5 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- Recent Fuzzing Paper☆35Updated last year
- practice☆66Updated 4 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆108Updated 5 years ago
- ☆91Updated 5 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 6 years ago
- Attacking the Core associated source files☆87Updated 7 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆139Updated 5 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 6 years ago
- Dockerfiles for (un)popular fuzzers!☆29Updated 4 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆67Updated 4 years ago
- Just a repo for random tools we have developed related to vulnerability research and exploit development.☆23Updated 4 years ago
- Research related☆87Updated 2 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 4 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆67Updated 6 years ago
- ☆134Updated 5 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆68Updated 7 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆66Updated 3 years ago
- ☆30Updated 3 months ago
- A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU☆69Updated 4 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- ☆22Updated 5 years ago
- #INFILTRATE20 raptor's party pack.☆28Updated last year
- Source code for building an exploitable linux kernel challenge iso.☆44Updated 11 years ago