Vulnerability research and development.
☆25Jul 22, 2015Updated 10 years ago
Alternatives and similar repositories for Vulndev
Users that are interested in Vulndev are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Oct 27, 2015Updated 10 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- A TE executable format loader for IDA☆28Sep 14, 2015Updated 10 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- INACTIVE - http://mzl.la/ghe-archive - Quokka is a utility to launch and monitor application for faults.☆40Apr 1, 2019Updated 6 years ago
- I'll submit the poc after blackhat☆117Aug 30, 2015Updated 10 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Oct 14, 2014Updated 11 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 6 years ago
- Exploiting MS15-061 local Privilege escalation☆49Sep 22, 2015Updated 10 years ago
- Huawei mate 7 TrustZone exploit☆109Aug 4, 2015Updated 10 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- A Reverse-Engineer's best friend.☆71Sep 17, 2017Updated 8 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 8 years ago
- A repository of public reports, publications, and presentations associated with research performed by Security Engineers at Security In…☆52Jul 2, 2019Updated 6 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Oct 23, 2017Updated 8 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- ☆138Mar 29, 2018Updated 7 years ago
- An open source, multi-architecture ROP compiler written in python☆163Jun 14, 2017Updated 8 years ago
- PoC exploit for CVE-2015-5477 BIND9 TKEY assertion failure☆65Aug 1, 2015Updated 10 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆18Oct 25, 2015Updated 10 years ago
- zer0m0n driver for cuckoo sandbox☆24Feb 24, 2015Updated 11 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- Demo bootloaders - created just for fun☆23Jul 1, 2017Updated 8 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- ☆79May 13, 2016Updated 9 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- s(4)u for Windows☆48Dec 8, 2020Updated 5 years ago
- some demos demonstrate the heap exploitation of ptmalloc2