h2hconference / 2019Links
H2HC 2019 Slides/Materials/Presentations
☆56Updated 5 years ago
Alternatives and similar repositories for 2019
Users that are interested in 2019 are comparing it to the libraries listed below
Sorting:
- H2HC 2017 Slides/Materials/Presentations☆48Updated 7 years ago
- Presentations in different conferences☆36Updated 5 years ago
- Proof of Concept's provided by Source Incite☆37Updated 8 years ago
- Presented hardware reverse engineering workshops since 2019☆62Updated last year
- Docker based Wargame Platform - To practice your CTF skills☆32Updated 9 years ago
- PoC for Foxit Reader CVE-2018-14442☆58Updated 6 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- ☆43Updated 7 years ago
- H2HC 2018 Slides/Materials/Presentations☆36Updated 4 years ago
- Slides and stuffs of the meetings during the 2019☆33Updated 3 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆60Updated 6 years ago
- Slides, papers, etc☆31Updated last year
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- My fuzzing workshop from PHDays9☆26Updated 6 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- source code audit tool☆48Updated 4 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆69Updated 5 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20Updated 6 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Updated 8 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Github Desktop RCE PoC☆29Updated 6 years ago
- Simple vulnerability scanning framework☆51Updated 8 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 6 years ago
- ☆20Updated last year
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆86Updated 6 years ago
- Break Apps with Frida workshop material☆46Updated 7 years ago