Exploitation on different architectures (x86, x64, arm, mips, avr)
☆38Oct 23, 2018Updated 7 years ago
Alternatives and similar repositories for exploitrainings
Users that are interested in exploitrainings are comparing it to the libraries listed below
Sorting:
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- Tool for generating Memory.scan() compatible instruction search patterns☆14Jul 29, 2022Updated 3 years ago
- Arm Episodes☆78Jan 25, 2018Updated 8 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Sep 28, 2021Updated 4 years ago
- ☆15Feb 25, 2026Updated last week
- ☆10Apr 11, 2023Updated 2 years ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- ☆11Aug 9, 2016Updated 9 years ago
- A modified android 8.1 for reverse engineer...☆11May 16, 2020Updated 5 years ago
- A curated list of awesome baseband research resources☆16Sep 8, 2019Updated 6 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆18Nov 26, 2025Updated 3 months ago
- ☆14Jun 24, 2017Updated 8 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- Automated Exploit generation with WinDBG☆190Oct 18, 2016Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 8 years ago
- ROPChain generator.☆40Sep 20, 2018Updated 7 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆16Oct 18, 2016Updated 9 years ago
- Getting windows operating system version information by 3 ways. using APIs,GetVersionEx, VerifyVersionInfo☆13Apr 9, 2015Updated 10 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- easy detour-, vftable-, iat- and eathooking☆12Mar 30, 2016Updated 9 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Oct 24, 2021Updated 4 years ago
- This PoC illustrates our work on asymmetric white-box cryptography, it can be used to generate a set of lookup tables used for lattice-ba…☆21Mar 24, 2021Updated 4 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Mar 2, 2021Updated 5 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- This is the source of our Return Oriented Programming tool.☆14Nov 8, 2019Updated 6 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- A talk+workshop on Accelerating Your Security Learning in 2017 given at null Bangalore 2017☆13Jan 23, 2017Updated 9 years ago
- S2E plugins library☆17Jan 7, 2020Updated 6 years ago
- Generates a Python script to give public interface names in an ActiveX file to an IDB file.☆51Jul 16, 2021Updated 4 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 3 years ago
- ☆19Apr 30, 2018Updated 7 years ago
- Fuzzing framework to target native components of android applications☆22Oct 22, 2022Updated 3 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentation…☆20Sep 18, 2017Updated 8 years ago
- Bbuzz: a bit-aware network protocol fuzzing and reverse engineering framework☆23Jan 27, 2021Updated 5 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago