cs-uob / COMSM0049Links
Systems and Software Security
☆16Updated 7 months ago
Alternatives and similar repositories for COMSM0049
Users that are interested in COMSM0049 are comparing it to the libraries listed below
Sorting:
- My conference presentations and Materials for them.☆32Updated 2 years ago
- Very Simple Fuzzer☆20Updated 4 years ago
- Joern Workshops☆26Updated 4 months ago
- An automated setup for compiling & fuzzing Apache httpd server☆49Updated last year
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆68Updated 8 months ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆35Updated 3 years ago
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆18Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes☆23Updated 2 years ago
- ☆17Updated 3 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆35Updated 6 months ago
- POC for Phantom Attack☆83Updated 2 years ago
- some useful scripts to solve pwn challenges in ctfs☆13Updated 4 years ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- some kernel exploit challenges and cve analysis☆26Updated 6 years ago
- Investigating the bug behind CVE-2021-26708☆27Updated 4 years ago
- A set of Code-ql/Joern queries to find vulnerabilities☆59Updated 4 years ago
- Code for UI, backend, engine and statistical analysis for RE☆22Updated 3 years ago
- fuzz the linux kernel bpf verifier☆80Updated 3 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆43Updated 2 years ago
- Simple FTP fuzzer to demonstrate boofuzz usage.☆28Updated 4 years ago
- ☆77Updated 3 years ago
- Analyze IoT firmware☆18Updated 4 years ago
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago
- ☆36Updated last year
- ☆44Updated 3 years ago
- ☆34Updated 3 years ago
- Some exploits I have written to showcase and to share☆53Updated 4 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆66Updated last year
- Collection of slides☆33Updated last year