jaybosamiya / fuzzing-numpyLinks
Experiments in trying to find 0-days in numpy
☆38Updated 8 years ago
Alternatives and similar repositories for fuzzing-numpy
Users that are interested in fuzzing-numpy are comparing it to the libraries listed below
Sorting:
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆25Updated 13 years ago
- A stateful fuzzing engine.☆45Updated 7 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 4 years ago
- Solutions for my 34C3CTF challenges☆21Updated 7 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Updated 9 years ago
- keynote I gave at GreHack 2019☆19Updated 6 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- ☆30Updated 7 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- exploit development☆49Updated 7 years ago
- ☆40Updated 7 years ago
- various CTF writeups☆61Updated 7 years ago
- TaintAll, a taint analysis and concolic execution tool☆32Updated 8 years ago
- 3D Accelerated Exploitation☆53Updated 6 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 8 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Updated 12 years ago
- Exploit code for CVE-2016-9066☆45Updated 8 years ago
- ☆43Updated 7 years ago
- ☆22Updated 6 years ago
- ☆14Updated 6 years ago
- specific fuzzers based on AFL and fuzzing results☆41Updated 9 years ago
- ☆74Updated 7 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 12 years ago
- Materials from Fuzzing Bay Area meetups☆68Updated 5 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 7 years ago
- A static Internet Explorer Fuzzer.☆50Updated 8 years ago
- ☆22Updated 7 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆40Updated 8 years ago
- ☆92Updated 4 years ago
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Updated 8 years ago