atxsinn3r / VulnCases
Vulnerability examples.
☆404Updated 11 months ago
Alternatives and similar repositories for VulnCases:
Users that are interested in VulnCases are comparing it to the libraries listed below
- A Binary Ninja plugin for vulnerability research.☆290Updated 7 months ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆144Updated 5 years ago
- OSEE Preparation☆175Updated 6 years ago
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆339Updated 4 years ago
- ☆304Updated 3 years ago
- A thorough library database to assist with binary exploitation tasks.☆197Updated 2 years ago
- ☆607Updated 2 years ago
- ☆189Updated 7 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆503Updated last month
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆385Updated 2 years ago
- Checksec, but for Windows: static detection of security mitigations in executables☆582Updated 3 months ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆142Updated 3 years ago
- Automatic exploit generation for simple linux pwn challenges.☆320Updated last year
- How to build an efficient pwn development environment in 2020☆261Updated 4 years ago
- collect for learning cases☆582Updated 9 months ago
- Linux Heap Exploitation Practice☆379Updated 6 years ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆418Updated 3 years ago
- Public repository for windbglib, a wrapper around pykd.pyd (for Windbg), used by mona.py☆326Updated 2 years ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆720Updated 5 months ago
- Cross Platform Kernel Fuzzer Framework☆450Updated 6 years ago
- the Network Protocol Fuzzer that we will want to use.☆750Updated last year
- ☆382Updated last year
- Using Intel's PIN tool to solve CTF problems☆498Updated 5 years ago
- VerSprite Security Research☆165Updated 2 years ago
- POC for cve-2019-1458☆172Updated 3 years ago
- An updated collection of resources targeting browser-exploitation.☆816Updated 4 years ago
- Collection of things made during my preparation to take on OSEE☆97Updated 5 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆393Updated 5 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆300Updated 2 years ago