atxsinn3r / VulnCases
Vulnerability examples.
☆398Updated 4 months ago
Related projects: ⓘ
- A Binary Ninja plugin for vulnerability research.☆278Updated last week
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆139Updated 4 years ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆409Updated 2 years ago
- Automatic exploit generation for simple linux pwn challenges.☆314Updated last year
- ☆293Updated 2 years ago
- ☆580Updated last year
- ☆173Updated 6 years ago
- Exploiting challenges in Linux and Windows☆121Updated 4 years ago
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆335Updated 4 years ago
- OSEE Preparation☆166Updated 5 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆499Updated 2 months ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆787Updated 4 years ago
- Collection of resources for my preparation to take the OSEE certification.☆214Updated 4 years ago
- Checksec, but for Windows: static detection of security mitigations in executables☆558Updated last year
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆349Updated last year
- A thorough library database to assist with binary exploitation tasks.☆195Updated 2 years ago
- collect for learning cases☆563Updated 3 months ago
- ☆303Updated this week
- How to build an efficient pwn development environment in 2020☆256Updated 3 years ago
- Linux Heap Exploitation Practice☆377Updated 5 years ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆701Updated last year
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆135Updated 3 years ago
- An updated collection of resources targeting browser-exploitation.☆807Updated 3 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 7 years ago
- List of real-world threats against endpoint protection software☆210Updated 4 months ago
- Fork of mona.py with x64dbg support☆95Updated 2 years ago
- Token Privilege Research☆777Updated 7 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆179Updated 7 years ago
- Payload development framework☆556Updated 3 weeks ago
- the Network Protocol Fuzzer that we will want to use.☆719Updated 7 months ago