invictus1306 / beebugLinks
A tool for checking exploitability
☆210Updated 6 years ago
Alternatives and similar repositories for beebug
Users that are interested in beebug are comparing it to the libraries listed below
Sorting:
- Hardcore corruption of my execve() vulnerability in WSL☆217Updated 8 years ago
- GUI tool to create ROP chains using the ropper API☆159Updated 7 years ago
- Automated Exploit generation with WinDBG☆190Updated 9 years ago
- Certified Edible Dinosaurs official CTF toolkit☆120Updated 7 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- The Zulu fuzzer☆124Updated 8 years ago
- Radare 2 wiki☆93Updated 5 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Automate repetitive tasks for fuzzing☆124Updated 4 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Updated 6 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆91Updated 6 years ago
- WinHeap Explorer repository.☆119Updated 7 years ago
- Fuzz testing: Beginner's guide☆76Updated last year
- ☆100Updated 7 years ago
- A Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.☆104Updated 5 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 8 years ago
- X41 Browser Security White Paper - Tools and PoCs☆183Updated 8 years ago
- 35C3 Junior CTF pwnables☆149Updated 7 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆172Updated 8 years ago
- ☆123Updated 4 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Updated 12 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆301Updated 3 years ago
- DEFCON CTF 2017 Stuff of Shit by HITCON☆95Updated 8 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Updated 6 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Updated 7 years ago
- Writeups for CTF competitions.☆33Updated 9 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Updated last year
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆119Updated 7 years ago
- A user-friendly fuzzing and crash triage tool for Windows☆132Updated 6 years ago