h2hconference / 2019Links
H2HC 2019 Slides/Materials/Presentations
☆56Updated 5 years ago
Alternatives and similar repositories for 2019
Users that are interested in 2019 are comparing it to the libraries listed below
Sorting:
- H2HC 2017 Slides/Materials/Presentations☆48Updated 7 years ago
- H2HC 2018 Slides/Materials/Presentations☆36Updated 4 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- Exploitation challenges for CTF☆63Updated 7 years ago
- Proof of Concept's provided by Source Incite☆37Updated 8 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆71Updated 8 years ago
- PoC for Foxit Reader CVE-2018-14442☆57Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Presentations in different conferences☆37Updated 6 years ago
- ☆43Updated 7 years ago
- Slides and stuffs of the meetings during the 2019☆33Updated 3 years ago
- ☆20Updated 7 years ago
- My fuzzing workshop from PHDays9☆26Updated 6 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆86Updated 6 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆69Updated 5 years ago
- Docker based Wargame Platform - To practice your CTF skills☆32Updated 9 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 6 years ago
- ☆100Updated 7 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆60Updated 6 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Updated 12 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆216Updated 7 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Updated 8 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- A fork of AFL for fuzzing Windows binaries☆23Updated 7 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago