☆23Mar 25, 2019Updated 6 years ago
Alternatives and similar repositories for clang-cfi-safestack-analysis
Users that are interested in clang-cfi-safestack-analysis are comparing it to the libraries listed below
Sorting:
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- ☆19Dec 28, 2021Updated 4 years ago
- A toy implementation of 'Stack Guard' on top of the LLVM compiler toolchain☆23Jul 1, 2017Updated 8 years ago
- Linux crash harness with runtime process instrumentation☆22Nov 7, 2020Updated 5 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- Vulnerabilities which found in Oracle products☆33Apr 17, 2019Updated 6 years ago
- Our publications of the Swiss E-Voting Public Intrusion Test (PIT)☆47Mar 12, 2019Updated 6 years ago
- Hardware-assisted Data-flow Isolation☆29Jan 28, 2018Updated 8 years ago
- Different code-injections techniques under a common tool☆30May 3, 2020Updated 5 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- CVE-2020-12828 PoC and Analysis.☆28Jun 30, 2020Updated 5 years ago
- It does the same thing as plugin FunctionStringAssociate for IDA, Now the script just works, in the future it is planned to increase the …☆57Mar 5, 2023Updated 3 years ago
- A docker example for privilege escalation☆25Jul 17, 2017Updated 8 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Aug 22, 2019Updated 6 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Jun 26, 2020Updated 5 years ago
- PoC materials to exploit CVE-2019-15846☆30Oct 10, 2019Updated 6 years ago
- Assorted pintools☆30Mar 30, 2020Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- run AFL with pintool☆67Feb 24, 2020Updated 6 years ago
- VSCode Ghidra Plugin/Script Skeletons☆30Aug 1, 2020Updated 5 years ago
- Python portage of the Microcode Explorer plugin☆31Mar 26, 2019Updated 6 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆75May 21, 2021Updated 4 years ago
- CVE-2020-2021☆22Oct 12, 2020Updated 5 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆226Jul 2, 2025Updated 8 months ago
- A LLVM Pass with runtime dataflow sanitization☆32Mar 28, 2019Updated 6 years ago
- ☆72Nov 6, 2019Updated 6 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Sep 21, 2017Updated 8 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago