alephsecurity / research
Research material and Proof-of-Concepts for Aleph Research Findings
☆86Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for research
- Capture The Flag Binary fuzzer for Heap challanges☆38Updated 6 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆20Updated 5 years ago
- Make ARM Shellcode Great Again☆61Updated 3 years ago
- For code snippets and information☆41Updated 5 years ago
- ☆30Updated 3 weeks ago
- 3D Accelerated Exploitation☆54Updated 5 years ago
- ☆99Updated 4 years ago
- #INFILTRATE20 raptor's party pack.☆28Updated 10 months ago
- ☆27Updated 6 years ago
- ☆91Updated 5 years ago
- Here be dragons. Or Slides. Or Papers. Or Nothing :)☆30Updated 5 years ago
- practice☆66Updated 4 years ago
- ☆100Updated 6 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆49Updated 6 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆24Updated 9 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆51Updated 5 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 4 years ago
- ☆54Updated last year
- The Damn Vulnerable Router Firmware Project☆30Updated 6 years ago
- exploit development☆49Updated 6 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆84Updated last year
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆107Updated 4 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆63Updated 3 years ago
- ☆44Updated 6 years ago
- python and honggfuzz☆25Updated 4 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆66Updated 4 years ago
- Worst Android kernel fuzzer☆44Updated 4 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 6 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆66Updated 7 years ago