bruce30262 / x86_shellcode_tutorialLinks
A training course for BambooFox
☆25Updated 9 years ago
Alternatives and similar repositories for x86_shellcode_tutorial
Users that are interested in x86_shellcode_tutorial are comparing it to the libraries listed below
Sorting:
- Some of my CTF solutions☆80Updated 6 years ago
- DEFCON CTF 2017 Stuff of Shit by HITCON☆95Updated 8 years ago
- Modified from pwndbg. Enhance the UI part for better usage.☆26Updated 6 years ago
- AIS3 2017 Binary Exploitation☆37Updated 8 years ago
- Machine Learning for Cyber Security☆27Updated 8 years ago
- Making GO reversing easier in IDA Pro☆17Updated 6 years ago
- ☆100Updated 4 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Updated 7 years ago
- ☆47Updated 6 years ago
- ☆100Updated 7 years ago
- A function tracer☆91Updated 6 years ago
- ☆51Updated 8 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆70Updated 8 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Updated 12 years ago
- ☆25Updated 7 years ago
- Heap exploitation technique bypassing heap ASLR☆48Updated 6 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆63Updated 4 years ago
- Python module to help in exploitation of the FILE structure in C☆27Updated 6 years ago
- adobe afdko fuzz☆41Updated 6 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆25Updated 8 years ago
- TCACHE (thread local caching in glibc malloc) attack vector common in heap exploitation☆12Updated 7 years ago
- The FTP fuzzer for Sulley and Peach.☆53Updated 11 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆71Updated 8 years ago
- A DBI tool to discover heap memory related bugs☆125Updated 7 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆60Updated 6 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- ☆43Updated 7 years ago
- Dead simple format string exploit payload generator☆25Updated 8 years ago
- TyphoonCon 2019☆52Updated 6 years ago