Exploitation and Mitigation Slides
☆136Jun 4, 2024Updated last year
Alternatives and similar repositories for yookiterm-slides
Users that are interested in yookiterm-slides are comparing it to the libraries listed below
Sorting:
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- ☆18May 18, 2018Updated 7 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Mar 21, 2018Updated 7 years ago
- A Course on Intermediate Level Linux Exploitation☆1,010Aug 24, 2020Updated 5 years ago
- Linux Binary Exploitation☆1,357Jun 15, 2021Updated 4 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆443Apr 11, 2025Updated 10 months ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- ☆19Dec 9, 2022Updated 3 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 6 months ago
- ☆19May 23, 2019Updated 6 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆214Jul 2, 2020Updated 5 years ago
- Fuzzing framework to target native components of android applications☆22Oct 22, 2022Updated 3 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆50Apr 6, 2018Updated 7 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,281Oct 7, 2022Updated 3 years ago
- share some useful archives about vm and qemu escape exploit.☆583Apr 12, 2024Updated last year
- Publications of my PDF vulnerability research, including presentation materials (slides and whitepapers) and demonstration files (proof-o…☆11Jul 4, 2020Updated 5 years ago
- baseband security research☆84Apr 7, 2021Updated 4 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Feb 11, 2024Updated 2 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- GDB plugin peda for arm☆147Sep 29, 2025Updated 5 months ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆521Jun 28, 2024Updated last year
- Slides and stuffs of the meetings during the 2019☆33Jan 18, 2022Updated 4 years ago
- PoC executable packer using resources☆31Sep 29, 2016Updated 9 years ago
- a list of web browser vulnerabilities☆20May 10, 2020Updated 5 years ago
- Exercises to learn how to fuzz with American Fuzzy Lop☆1,276Oct 12, 2022Updated 3 years ago
- IDA Sploiter is a plugin for Hex-Ray's IDA Pro disassembler designed to enhance IDA's capabilities as an exploit development and vulnerab…☆198Aug 7, 2019Updated 6 years ago
- ☆95Apr 2, 2019Updated 6 years ago
- Bug hunting through fuzzer/*-sanitizer/etc...☆133Dec 18, 2020Updated 5 years ago
- List of Awesome Advanced Windows Exploitation References☆1,547Jan 13, 2022Updated 4 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- TSAR (Traits Static AnalyzeR)☆15May 3, 2024Updated last year
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- An archive of low-level CTF challenges developed over the years☆653Nov 28, 2021Updated 4 years ago
- Linux Heap Exploitation Practice☆395Dec 1, 2018Updated 7 years ago
- Android Kernel Exploitation☆639Feb 13, 2022Updated 4 years ago
- Materials from Fuzzing Bay Area meetups☆68Dec 20, 2019Updated 6 years ago