alephsecurity / research
Research material and Proof-of-Concepts for Aleph Research Findings
☆89Updated 3 years ago
Alternatives and similar repositories for research:
Users that are interested in research are comparing it to the libraries listed below
- Make ARM Shellcode Great Again☆62Updated 4 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- For code snippets and information☆41Updated 6 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆70Updated 7 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 7 years ago
- exploit development☆49Updated 7 years ago
- Materials from Fuzzing Bay Area meetups☆68Updated 5 years ago
- ☆28Updated 6 years ago
- Recent Fuzzing Paper☆35Updated last year
- ☆88Updated 6 years ago
- ☆91Updated 5 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- ☆102Updated 5 years ago
- A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU☆69Updated 5 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆24Updated 10 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆67Updated 3 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 6 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆139Updated 5 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆67Updated 4 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- ☆99Updated 6 years ago
- practice☆66Updated 5 years ago
- ☆36Updated 6 years ago
- New improved corpus distillation toolset that has helped to found tens of vulnerabilities in MS and Adobe products☆55Updated 5 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆34Updated 6 years ago