invictus1306 / beebugLinks
A tool for checking exploitability
☆210Updated 6 years ago
Alternatives and similar repositories for beebug
Users that are interested in beebug are comparing it to the libraries listed below
Sorting:
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆157Updated 7 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- Certified Edible Dinosaurs official CTF toolkit☆120Updated 7 years ago
- Automated Exploit generation with WinDBG☆190Updated 9 years ago
- ☆100Updated 7 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- WinHeap Explorer repository.☆119Updated 7 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Updated 12 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆91Updated 6 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 6 years ago
- 35C3 Junior CTF pwnables☆148Updated 6 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Updated 6 years ago
- X41 Browser Security White Paper - Tools and PoCs☆184Updated 8 years ago
- Fuzz testing: Beginner's guide☆76Updated last year
- Radare 2 wiki☆94Updated 5 years ago
- PoC for Foxit Reader CVE-2018-14442☆57Updated 6 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆118Updated 11 months ago
- The Zulu fuzzer☆124Updated 8 years ago
- VirtualBox 3D exploits & PoCs☆161Updated 6 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 8 years ago
- List of real-world threats against endpoint protection software☆215Updated 2 months ago
- linux rootkit☆161Updated 7 years ago
- ☆123Updated 4 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆299Updated 2 years ago
- Attacking the Core associated source files☆88Updated 7 years ago
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆100Updated 9 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Updated 7 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Updated 4 years ago
- A fork of AFL for fuzzing Windows binaries☆23Updated 7 years ago