farazsth98 / virtualbox-qemu-vuln-research-notes
Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, and more.
☆182Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for virtualbox-qemu-vuln-research-notes
- ☆163Updated 9 months ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆187Updated 2 years ago
- ☆189Updated last year
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆39Updated 2 years ago
- PoC of fuzzing closed-source userspace binaries with KVM☆164Updated 6 months ago
- Old and new CTFs about Linux kernel exploitation.☆50Updated 2 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆109Updated 7 years ago
- An awesome list for Effective and Powerful harnesses for fuzzing using libfuzzer - fuzzers by Google☆73Updated 4 years ago
- A collection of curated resources and CVEs I use for research.☆102Updated 3 years ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆106Updated last year
- A collection of browser exploitation codes from Singular Security Lab.☆181Updated last year
- ☆181Updated last year
- A collection of my weggli patterns to facilitate vulnerability research.☆93Updated 10 months ago
- ☆152Updated 5 years ago
- ☆134Updated 3 years ago
- A DOM fuzzer☆143Updated 2 years ago
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆148Updated 10 months ago
- Collection of browser challenges☆120Updated 3 years ago
- ☆113Updated 2 years ago
- Fuzzing library written in/for python.☆84Updated 4 years ago
- "Pwntools does not support Windows. Use a real OS ;)" — Zach Riggle, 2015☆81Updated 5 years ago
- ☆142Updated this week
- Windows Graphics Device Interface (GDI+) fuzzer☆126Updated 4 years ago
- ☆24Updated 3 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆144Updated 3 years ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆86Updated 5 years ago
- WCTF 2019 challenge☆99Updated 5 years ago
- a new class of file structure attacks☆45Updated 2 years ago
- AFL binary instrumentation☆293Updated last year
- A tool for automating setup of kernel pwn challenges☆49Updated this week