ga1ois / Recon-2018-MontrealLinks
☆22Updated 7 years ago
Alternatives and similar repositories for Recon-2018-Montreal
Users that are interested in Recon-2018-Montreal are comparing it to the libraries listed below
Sorting:
- A stateful fuzzing engine.☆45Updated 7 years ago
- CVE-2018-4330 POC for iOS☆17Updated 7 years ago
- ☆43Updated 7 years ago
- ☆31Updated 8 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 6 years ago
- black hat Asia 2017 Slides☆22Updated 8 years ago
- Slides of 44Con 2018☆22Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- PoC code for CVE-2018-9539☆20Updated 7 years ago
- Automatically generate ASM.JS JIT-Spray payloads☆36Updated 7 years ago
- keynote I gave at GreHack 2019☆19Updated 6 years ago
- everyone can fuzz h2☆24Updated 6 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆23Updated 8 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Updated 9 years ago
- ☆39Updated 4 years ago
- A Modern Approach☆10Updated 10 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Updated 6 years ago
- Kernel Stack info leak at exportObjectToClient function☆42Updated 6 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆40Updated 9 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆59Updated 9 years ago
- Magellan PoC☆34Updated 7 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 7 years ago
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Updated 8 years ago
- ☆17Updated 5 years ago
- ☆12Updated 5 years ago
- ☆14Updated 7 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Updated 7 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 10 years ago
- ASLR bypass in Chrome version 77☆24Updated 6 years ago
- My conference presentations and publications☆26Updated 3 years ago