invictus1306 / beebugLinks
A tool for checking exploitability
☆210Updated 6 years ago
Alternatives and similar repositories for beebug
Users that are interested in beebug are comparing it to the libraries listed below
Sorting:
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- Certified Edible Dinosaurs official CTF toolkit☆121Updated 7 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 5 years ago
- ☆192Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆155Updated 7 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Updated 6 years ago
- Automate repetitive tasks for fuzzing☆125Updated 3 years ago
- ☆99Updated 6 years ago
- Radare 2 wiki☆92Updated 5 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆301Updated 2 years ago
- ☆87Updated 8 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆118Updated 6 months ago
- Chakra vulnerability and exploit bypass all system mitigation☆83Updated 6 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Updated 5 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆119Updated 7 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Updated 7 years ago
- ☆123Updated 3 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆173Updated 7 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- linux rootkit☆160Updated 7 years ago
- VirtualBox 3D exploits & PoCs☆162Updated 6 years ago
- Some kernel exploits☆144Updated 7 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆91Updated 11 years ago
- The first open source vulnerability scanner for firmwares☆195Updated 8 years ago