alleleintel / researchLinks
Research developed by Allele Security Intelligence.
☆15Updated 4 months ago
Alternatives and similar repositories for research
Users that are interested in research are comparing it to the libraries listed below
Sorting:
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 11 months ago
- ☆16Updated last year
- ☆80Updated 9 months ago
- ☆18Updated 5 years ago
- Slides about HyperDbg☆40Updated 4 months ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆28Updated 3 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Updated 5 years ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- #INFILTRATE19 raptor's party pack.☆32Updated last month
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆16Updated last year
- ☆26Updated 2 weeks ago
- A collection of various exploits☆28Updated last year
- Cisco RV110w UPnP stack overflow☆28Updated 4 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 5 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆63Updated 2 years ago
- ☆13Updated 2 years ago
- Super IOCTL Basic Fuzzer☆15Updated 6 years ago
- A MBR Fuzzer☆30Updated last year
- ☆13Updated 4 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- ☆22Updated last week
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- ☆37Updated 11 months ago
- V8sandbox_bypass using stack misalignment☆23Updated last year
- #INFILTRATE20 raptor's party pack.☆29Updated last month
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆42Updated 4 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆122Updated 3 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 6 years ago
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 3 years ago
- ☆30Updated 4 months ago