cryptolok / ASLRay
Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying
☆300Updated 2 years ago
Alternatives and similar repositories for ASLRay:
Users that are interested in ASLRay are comparing it to the libraries listed below
- linux rootkit☆159Updated 7 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆323Updated 3 years ago
- ☆192Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆314Updated 7 years ago
- Local UNIX PrivEsc Aggregation☆246Updated 9 years ago
- Content from presentation at BHUSA 2017☆180Updated 7 years ago
- ☆137Updated 3 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- HORSEPILL rootkit PoC☆226Updated 8 years ago
- The first open source vulnerability scanner for firmwares☆194Updated 8 years ago
- GUI tool to create ROP chains using the ropper API☆156Updated 7 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆214Updated 7 years ago
- UAC 0day, all day!☆277Updated 7 years ago
- A tool for checking exploitability☆209Updated 5 years ago
- ☆141Updated 7 years ago
- Radare Congress Stuff☆208Updated 5 months ago
- Cross Platform Kernel Fuzzer Framework☆450Updated 6 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆263Updated 7 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆151Updated 4 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆118Updated 5 months ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆284Updated 8 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Updated 5 years ago
- CTF Writeups☆186Updated 7 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Updated 6 years ago
- Files from my DEFCON CTF VM.☆270Updated 8 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆447Updated 9 years ago
- my public code☆166Updated 8 years ago
- Repository to train/learn memory corruption on the ARM platform.☆351Updated 7 years ago