☆111May 16, 2017Updated 8 years ago
Alternatives and similar repositories for disclosures
Users that are interested in disclosures are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2016-1287 vulnerability test☆16Feb 15, 2016Updated 10 years ago
- Exploit code for CVE-2016-1757☆84Apr 27, 2016Updated 9 years ago
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- AFL "mostly" ported to cygwin☆26Apr 11, 2016Updated 9 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆323May 9, 2016Updated 9 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Public repository for improvements to the EXTRABACON exploit☆163Nov 2, 2016Updated 9 years ago
- Plugin for binary ninja to centralize features useful in static analysis.☆15Mar 3, 2020Updated 6 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- A clone (of the basic core) of AFL fuzzer☆74Feb 6, 2016Updated 10 years ago
- "Just Another ReVersIng Suite" or whatever other bullshit you can think of☆150Apr 28, 2023Updated 2 years ago
- Run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts.☆298Nov 23, 2017Updated 8 years ago
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 9 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆61Oct 16, 2015Updated 10 years ago
- jeap, exploit 10 in 0ctf 2016 quals☆15Mar 14, 2016Updated 10 years ago
- A TE executable format loader for IDA☆28Sep 14, 2015Updated 10 years ago
- A linux system call fuzzer using TriforceAFL☆177Feb 28, 2024Updated 2 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆241Nov 19, 2025Updated 4 months ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- Proof-of-Concept code for exploits☆82May 5, 2016Updated 9 years ago
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)☆140Jan 4, 2017Updated 9 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- map file generator for intel x86 binary based on flirt signature☆83May 2, 2016Updated 9 years ago
- Project for the Crypto subject at Uni☆18Dec 26, 2016Updated 9 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- ☆44Aug 9, 2017Updated 8 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago