☆74Nov 19, 2022Updated 3 years ago
Alternatives and similar repositories for ExecASLR-ekoparty
Users that are interested in ExecASLR-ekoparty are comparing it to the libraries listed below
Sorting:
- ☆15Mar 13, 2023Updated 2 years ago
- kernel exploit POC for vulnerability i found in amd gpu driver☆11Jan 6, 2023Updated 3 years ago
- ☆14Feb 7, 2023Updated 3 years ago
- ☆18Mar 28, 2023Updated 2 years ago
- ☆46Jan 23, 2022Updated 4 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.☆74Apr 8, 2022Updated 3 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- transpile llil to c++ for execution and testing☆48Jan 11, 2024Updated 2 years ago
- attachments for forum of RealWorld CTF 3rd☆42Jan 7, 2021Updated 5 years ago
- ☆51Mar 9, 2022Updated 3 years ago
- Bindings for Microsoft WinDBG TTD☆235Aug 5, 2023Updated 2 years ago
- A Ghidra static analysis tool for locating PACMAN Gadgets☆13Sep 1, 2022Updated 3 years ago
- ☆12Aug 31, 2022Updated 3 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- ☆85Oct 15, 2022Updated 3 years ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆82Nov 14, 2022Updated 3 years ago
- Integration of Microsoft Warbird with the MSVC compiler☆132Jul 16, 2023Updated 2 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- WebKit/JSC CodeQL Databases☆17Dec 15, 2025Updated 2 months ago
- Useful Plugin for IDA to Trace Function Call Tree☆27Jan 4, 2018Updated 8 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- ☆31Feb 20, 2022Updated 4 years ago
- Finding Truth in the Shadows☆123Jan 26, 2023Updated 3 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆68Aug 11, 2023Updated 2 years ago
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆123Sep 3, 2021Updated 4 years ago
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆32Aug 11, 2023Updated 2 years ago
- This plugin serves as a bridge between Binary Ninja and Ghidra's disassembler.☆36Jun 27, 2022Updated 3 years ago
- CTF Write-ups☆29Apr 20, 2021Updated 4 years ago
- (Inverse Path | F-Secure) Hardware Security Team - Security Advisories☆24Dec 15, 2021Updated 4 years ago
- ☆20May 24, 2021Updated 4 years ago
- Xyntia, the black-box deobfuscator☆87Dec 11, 2025Updated 2 months ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- ☆33Dec 22, 2020Updated 5 years ago
- White-box analytic framework based on LLVM☆39Jun 10, 2019Updated 6 years ago
- A fast execution trace symbolizer for Windows.☆130May 6, 2024Updated last year
- win32/x64 obfuscate framework☆33Apr 16, 2019Updated 6 years ago
- A framework provides an interface to monitor and control fuzzers☆30Jul 5, 2023Updated 2 years ago