☆73Nov 19, 2022Updated 3 years ago
Alternatives and similar repositories for ExecASLR-ekoparty
Users that are interested in ExecASLR-ekoparty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Feb 7, 2023Updated 3 years ago
- ☆15Mar 13, 2023Updated 3 years ago
- ☆15May 30, 2023Updated 2 years ago
- ☆18Mar 28, 2023Updated 2 years ago
- ☆46Jan 23, 2022Updated 4 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Aug 11, 2023Updated 2 years ago
- transpile llil to c++ for execution and testing☆48Jan 11, 2024Updated 2 years ago
- kernel exploit POC for vulnerability i found in amd gpu driver☆11Jan 6, 2023Updated 3 years ago
- ☆51Mar 9, 2022Updated 4 years ago
- PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.☆74Apr 8, 2022Updated 3 years ago
- ☆85Oct 15, 2022Updated 3 years ago
- Bindings for Microsoft WinDBG TTD☆235Aug 5, 2023Updated 2 years ago
- laboratório sobre buffer overflows☆15Apr 17, 2017Updated 8 years ago
- attachments for forum of RealWorld CTF 3rd☆42Jan 7, 2021Updated 5 years ago
- ☆12Aug 31, 2022Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- A fast execution trace symbolizer for Windows.☆130May 6, 2024Updated last year
- Integration of Microsoft Warbird with the MSVC compiler☆133Jul 16, 2023Updated 2 years ago
- ☆31Feb 20, 2022Updated 4 years ago
- Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture can Leak Private Data☆20Oct 13, 2022Updated 3 years ago
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆124Sep 3, 2021Updated 4 years ago
- Slides from various conference talks☆37May 30, 2023Updated 2 years ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆82Nov 14, 2022Updated 3 years ago
- A Ghidra static analysis tool for locating PACMAN Gadgets☆13Sep 1, 2022Updated 3 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆200Jul 27, 2022Updated 3 years ago
- Finding Truth in the Shadows☆125Jan 26, 2023Updated 3 years ago
- CTF Write-ups☆29Apr 20, 2021Updated 4 years ago
- ☆33Dec 22, 2020Updated 5 years ago
- LPE exploit for CVE-2023-36802☆168Oct 10, 2023Updated 2 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆68Aug 11, 2023Updated 2 years ago
- WebKit/JSC CodeQL Databases☆17Dec 15, 2025Updated 3 months ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- LKRG bypass methods☆74Jan 10, 2020Updated 6 years ago
- Useful Plugin for IDA to Trace Function Call Tree☆27Jan 4, 2018Updated 8 years ago
- Welcome to Hoyt's macOS Fuzzing & Code Repo. Contribute Code or Open an Issue or Discussion.☆50Feb 8, 2026Updated last month
- linux kernel LPE using hw_breakpoint attack tech demo☆26Mar 24, 2023Updated 2 years ago
- This plugin serves as a bridge between Binary Ninja and Ghidra's disassembler.☆36Jun 27, 2022Updated 3 years ago
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆32Aug 11, 2023Updated 2 years ago