alisaesage / Disclosures
Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts
☆419Updated 3 years ago
Alternatives and similar repositories for Disclosures:
Users that are interested in Disclosures are comparing it to the libraries listed below
- Vulnerability examples.☆404Updated last year
- Slide decks from my conference presentations☆363Updated last year
- Exploit for CVE-2019-9810 Firefox on Windows 64-bit.☆229Updated 5 years ago
- collect for learning cases☆583Updated 10 months ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- collection of verified Linux kernel exploits☆187Updated 4 years ago
- My Chrome and Safari exploit code + write-up repo☆528Updated 3 years ago
- Automatic exploit generation for simple linux pwn challenges.☆321Updated last year
- A Binary Ninja plugin for vulnerability research.☆294Updated 7 months ago
- A thorough library database to assist with binary exploitation tasks.☆198Updated 2 years ago
- ☆383Updated last year
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆746Updated last year
- ☆304Updated 3 years ago
- Exploit Development, Reverse Engineering & Cryptography☆252Updated 4 years ago
- Public work for CVE-2019-0708☆292Updated 5 years ago
- An updated collection of resources targeting browser-exploitation.☆817Updated 4 years ago
- SSD Secure Disclosure Advisories☆169Updated 4 years ago
- VerSprite Security Research☆167Updated 2 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆819Updated 4 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆143Updated 3 years ago
- Linux Heap Exploitation Practice☆383Updated 6 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆504Updated 2 months ago
- Exploitation and Mitigation Slides☆128Updated 11 months ago
- How to build an efficient pwn development environment in 2020☆263Updated 4 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆209Updated 2 years ago
- Collection of scripts and writeups☆320Updated 3 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆386Updated 2 years ago
- Dump of win32k POCs for bugs I've found☆373Updated 3 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆222Updated 4 years ago
- OSEE Preparation☆176Updated 6 years ago