alephsecurity / research
Research material and Proof-of-Concepts for Aleph Research Findings
☆89Updated 3 years ago
Alternatives and similar repositories for research:
Users that are interested in research are comparing it to the libraries listed below
- Make ARM Shellcode Great Again☆62Updated 3 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- ☆28Updated 6 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 6 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆67Updated 3 years ago
- Frida-based general purpose fuzzer☆213Updated 4 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆67Updated 4 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆68Updated 7 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- ☆88Updated 6 years ago
- ☆100Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- A library for patching ELFs☆53Updated 4 years ago
- Some presentations I did in the past☆64Updated last year
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- Just a repo for random tools we have developed related to vulnerability research and exploit development.☆23Updated 4 years ago
- Research related☆89Updated 2 years ago
- ☆84Updated last year
- Recent Fuzzing Paper☆35Updated last year
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆139Updated 5 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- A collection of curated resources and CVEs I use for research.☆105Updated 3 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆108Updated 5 years ago
- #INFILTRATE20 raptor's party pack.☆28Updated last year
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- practice☆66Updated 5 years ago
- Dockerfiles for (un)popular fuzzers!☆29Updated 4 years ago
- Attacking the Core associated source files☆87Updated 7 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- exploit development☆49Updated 7 years ago