h2hconference / 2019
H2HC 2019 Slides/Materials/Presentations
☆56Updated 5 years ago
Alternatives and similar repositories for 2019
Users that are interested in 2019 are comparing it to the libraries listed below
Sorting:
- H2HC 2017 Slides/Materials/Presentations☆48Updated 7 years ago
- H2HC 2018 Slides/Materials/Presentations☆36Updated 4 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Slides and stuffs of the meetings during the 2019☆33Updated 3 years ago
- Slides, papers, etc☆31Updated last year
- Presentations in different conferences☆35Updated 5 years ago
- A tool for checking exploitability☆209Updated 5 years ago
- ☆19Updated 10 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- PoC for Foxit Reader CVE-2018-14442☆58Updated 6 years ago
- ☆135Updated 5 years ago
- Proof of Concept's provided by Source Incite☆37Updated 7 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 9 months ago
- My fuzzing workshop from PHDays9☆26Updated 5 years ago
- ☆44Updated 6 years ago
- This is just my personal compilation of APT malware from whitepaper releases, documents and malware samples from my personal research.☆31Updated 5 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆97Updated 7 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 5 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆80Updated 8 months ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆60Updated 6 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- ☆20Updated 7 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 8 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago