blankwall / Offensive-ConLinks
Talk and materials for Offensive Con presentation - Privileged Helper Tools
☆47Updated 6 years ago
Alternatives and similar repositories for Offensive-Con
Users that are interested in Offensive-Con are comparing it to the libraries listed below
Sorting:
- Graphical ROP chain builder using radare2 and r2pipe☆52Updated 7 years ago
- ☆43Updated 7 years ago
- Misc PoCs for various research topics☆21Updated 3 years ago
- ☆91Updated 6 years ago
- Exploit code for CVE-2016-9066☆44Updated 8 years ago
- ☆45Updated 7 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆70Updated 8 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 4 years ago
- Attacking the Core associated source files☆88Updated 7 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 7 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- ☆49Updated 7 years ago
- Binary Ninja Posters☆35Updated 5 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- Memory inspection REPL interface☆45Updated 8 years ago
- ☆39Updated 4 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Updated 7 years ago
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆25Updated 13 years ago
- ARM rop chain gadget searcher☆38Updated 8 years ago
- exploit development☆49Updated 7 years ago
- various CTF writeups☆61Updated 7 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Black Hat 2016 Slides, Paper and Code☆81Updated 9 years ago
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Updated 8 years ago
- A Python tool to generate ROP chains☆64Updated 9 months ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago