☆15Oct 27, 2015Updated 10 years ago
Alternatives and similar repositories for Security
Users that are interested in Security are comparing it to the libraries listed below
Sorting:
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- Adobe Flash Player File Instrumentation Tool For Security Research☆86Sep 3, 2022Updated 3 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 8 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Crash repro minifier for ASan-instrumented commandline tools.☆12Dec 29, 2019Updated 6 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Apr 26, 2016Updated 9 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆24Apr 10, 2013Updated 12 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- ☆61Feb 8, 2016Updated 10 years ago
- Very very useful example of loading and relocating the (Win32) DLL from memory (!) which allows many possibilities and much more flexibil…☆20Jan 2, 2013Updated 13 years ago
- A static Internet Explorer Fuzzer.☆50Jun 15, 2017Updated 8 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- ☆10Jan 26, 2016Updated 10 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Random Code Store☆17Mar 27, 2023Updated 2 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- TrueType Font Fuzzer☆53Nov 6, 2015Updated 10 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago