jaybosamiya / fuzzing-numpyLinks
Experiments in trying to find 0-days in numpy
☆38Updated 8 years ago
Alternatives and similar repositories for fuzzing-numpy
Users that are interested in fuzzing-numpy are comparing it to the libraries listed below
Sorting:
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- ☆30Updated 6 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆25Updated 13 years ago
- Solutions for my 34C3CTF challenges☆21Updated 7 years ago
- keynote I gave at GreHack 2019☆19Updated 5 years ago
- A stateful fuzzing engine.☆45Updated 6 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 4 years ago
- exploit development☆49Updated 7 years ago
- TaintAll, a taint analysis and concolic execution tool☆32Updated 8 years ago
- Exploit code for CVE-2016-9066☆43Updated 8 years ago
- ARG: Automatic ROP chains Generation☆22Updated 6 years ago
- ☆37Updated 6 years ago
- 3D Accelerated Exploitation☆53Updated 6 years ago
- Fuzzing results for various interpreters.☆82Updated 7 years ago
- ☆92Updated 4 years ago
- ☆22Updated 6 years ago
- Integrate the dharma grammar fuzzer into honggfuzz☆26Updated 8 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆38Updated 8 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Updated 9 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆95Updated 7 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆91Updated 12 years ago
- Analysis tools and exploit sample scripts for Adobe Reader 10/11 and Acrobat Reader DC☆79Updated 9 years ago
- Simulate afl-fuzz☆16Updated 6 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- ☆14Updated 7 years ago
- ☆81Updated 8 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Updated 7 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 7 years ago
- ☆43Updated 7 years ago