invictus1306 / beebugLinks
A tool for checking exploitability
☆210Updated 6 years ago
Alternatives and similar repositories for beebug
Users that are interested in beebug are comparing it to the libraries listed below
Sorting:
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- Automate repetitive tasks for fuzzing☆124Updated 4 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- Certified Edible Dinosaurs official CTF toolkit☆121Updated 7 years ago
- X41 Browser Security White Paper - Tools and PoCs☆184Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆158Updated 7 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- ☆99Updated 7 years ago
- Fuzz testing: Beginner's guide☆76Updated last year
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 5 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- Radare 2 wiki☆94Updated 5 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆173Updated 7 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆91Updated 12 years ago
- ☆123Updated 4 years ago
- List of real-world threats against endpoint protection software☆216Updated 3 weeks ago
- 35C3 Junior CTF pwnables☆148Updated 6 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Updated 6 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Updated 7 years ago
- ☆100Updated 3 years ago
- A Not So Very Intelligent Fuzzer: An advanced fuzzing framework designed to find vulnerabilities in C/C++ code.☆102Updated 4 years ago
- A fork of AFL for fuzzing Windows binaries☆23Updated 7 years ago
- Attacking the Core associated source files☆88Updated 7 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Updated 7 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆92Updated 6 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago
- ☆192Updated 7 years ago