☆15Oct 27, 2015Updated 10 years ago
Alternatives and similar repositories for Security
Users that are interested in Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- Adobe Flash Player File Instrumentation Tool For Security Research☆86Sep 3, 2022Updated 3 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 8 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Crash repro minifier for ASan-instrumented commandline tools.☆12Dec 29, 2019Updated 6 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- ☆48Nov 28, 2016Updated 9 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Apr 26, 2016Updated 9 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- ☆60Feb 8, 2016Updated 10 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆108Jul 26, 2016Updated 9 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- ☆10Jan 26, 2016Updated 10 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- Try to transport the tcpip stack of ReactOS to Windows XP.☆17Feb 27, 2014Updated 12 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- Hex-Rays Decompiler Enhanced View☆185Sep 21, 2018Updated 7 years ago
- fuzz☆125Jul 18, 2015Updated 10 years ago
- Windbg extension to find PatchGuard pages☆123Jun 24, 2014Updated 11 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- Debugger for HTC phones bootloader (HBOOT).☆20Nov 28, 2013Updated 12 years ago
- Remote thread injected DLL libraries, support for windows 32-bit and 64-bit platforms☆33Feb 6, 2015Updated 11 years ago
- Python scripts for reverse engineering.☆188May 7, 2021Updated 4 years ago
- Python wrapper for DbgEng☆39Nov 21, 2016Updated 9 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆24Apr 10, 2013Updated 12 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Jan 8, 2017Updated 9 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- Windows kernel vulnerability in win32k.sys Driver☆35Dec 6, 2015Updated 10 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago