Vulnerability research and development.
☆25Jul 22, 2015Updated 10 years ago
Alternatives and similar repositories for Vulndev
Users that are interested in Vulndev are comparing it to the libraries listed below
Sorting:
- A TE executable format loader for IDA☆28Sep 14, 2015Updated 10 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- ☆15Oct 27, 2015Updated 10 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- INACTIVE - http://mzl.la/ghe-archive - Quokka is a utility to launch and monitor application for faults.☆40Apr 1, 2019Updated 6 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆18Oct 25, 2015Updated 10 years ago
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 6 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- zer0m0n driver for cuckoo sandbox☆24Feb 24, 2015Updated 11 years ago
- A Reverse-Engineer's best friend.☆71Sep 17, 2017Updated 8 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Jul 24, 2019Updated 6 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Oct 14, 2014Updated 11 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 8 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Oct 23, 2017Updated 8 years ago
- I'll submit the poc after blackhat☆117Aug 30, 2015Updated 10 years ago
- ☆17Aug 20, 2014Updated 11 years ago
- ☆26Jan 18, 2026Updated last month
- An open source, multi-architecture ROP compiler written in python☆163Jun 14, 2017Updated 8 years ago
- Exploiting MS15-061 local Privilege escalation☆49Sep 22, 2015Updated 10 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆61Oct 16, 2015Updated 10 years ago
- ☆79May 13, 2016Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- s(4)u for Windows☆48Dec 8, 2020Updated 5 years ago
- ☆45Feb 24, 2018Updated 8 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- ☆137Mar 29, 2018Updated 7 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago