iamavu / vr-rev-jobs
list of organizations offering vulnerability research/reverse engineering jobs
☆63Updated last month
Alternatives and similar repositories for vr-rev-jobs:
Users that are interested in vr-rev-jobs are comparing it to the libraries listed below
- Leveraging patch diffing to discover new vulnerabilities☆119Updated 6 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆153Updated 5 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆98Updated 2 months ago
- All Files, Scripts, and exploits can be found here☆64Updated 4 years ago
- ASLR bypass without infoleak☆160Updated 3 years ago
- Collection of browser challenges☆130Updated 4 years ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆84Updated 4 months ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆41Updated last year
- Damn Vulenerable Kernel Module for kernel fuzzing☆58Updated 6 months ago
- ☆50Updated 6 years ago
- Easily debug processes running in docker containers☆22Updated 10 months ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆60Updated 3 weeks ago
- Linux & Android Kernel Vulnerability research and exploitation☆40Updated last year
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆52Updated last year
- examples of using radius2 to solve reversing challenges☆35Updated 4 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 2 months ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆168Updated last year
- A tool for automating setup of kernel pwn challenges☆55Updated 5 months ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- A comprehensive Hypervisor resources repo☆106Updated 2 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆97Updated 3 years ago
- ☆16Updated 6 months ago
- An intuitive query API for IDA Pro☆155Updated last month
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆127Updated last year
- An educational Bochs-based snapshot fuzzer project☆172Updated 4 months ago
- A collection of web browser CTF challenges and solutions.☆26Updated 2 years ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆63Updated 10 months ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆115Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆117Updated this week