h2hconference / 2019Links
H2HC 2019 Slides/Materials/Presentations
☆56Updated 6 years ago
Alternatives and similar repositories for 2019
Users that are interested in 2019 are comparing it to the libraries listed below
Sorting:
- H2HC 2017 Slides/Materials/Presentations☆48Updated 7 years ago
- ☆43Updated 7 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 8 years ago
- Proof of Concept's provided by Source Incite☆37Updated 8 years ago
- PoC for Foxit Reader CVE-2018-14442☆57Updated 7 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- Slides and stuffs of the meetings during the 2019☆33Updated 4 years ago
- Presentations in different conferences☆37Updated 6 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- H2HC 2018 Slides/Materials/Presentations☆36Updated 5 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆86Updated 6 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆69Updated 6 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 9 years ago
- My fuzzing workshop from PHDays9☆26Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Radamsa fuzzer extension for Burp Suite☆23Updated 12 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Updated 12 years ago
- A fork of AFL for fuzzing Windows binaries☆23Updated 7 years ago
- ☆20Updated 7 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Updated 6 years ago
- Firmware analysis website + API☆43Updated 5 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Updated 8 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆217Updated 7 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 8 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆99Updated 8 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- ☆26Updated 4 months ago
- An example rootkit that gives a userland process root permissions☆78Updated 6 years ago