joydo / CVE-Writeups
My Personal Reading lists for CVE Writeups
☆33Updated 3 years ago
Alternatives and similar repositories for CVE-Writeups:
Users that are interested in CVE-Writeups are comparing it to the libraries listed below
- ☆25Updated 3 years ago
- harness for fuzzing with winafl. both public and my own which i have released.☆53Updated 3 years ago
- Example files to experience basic exploit techniques.☆73Updated 5 years ago
- ☆49Updated 4 years ago
- ☆45Updated last year
- ☆74Updated 2 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆139Updated 4 years ago
- A collection of curated resources and CVEs I use for research.☆104Updated 3 years ago
- ☆29Updated last month
- ☆12Updated 8 months ago
- ☆83Updated last year
- Linux Kernel N-day Exploit/Analysis.☆63Updated 3 months ago
- Old and new CTFs about Linux kernel exploitation.☆52Updated 2 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆192Updated 2 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆65Updated 3 years ago
- ☆46Updated 6 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆48Updated 4 years ago
- ☆115Updated 10 months ago
- A collection of web browser CTF challenges and solutions.☆26Updated 2 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆182Updated 11 months ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 4 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- Some presentations I did in the past☆64Updated last year
- CTF challenges that I created☆18Updated 3 years ago
- A repository for my conference presentations☆35Updated 4 years ago
- My conference presentations and Materials for them.☆32Updated 2 years ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆30Updated 4 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- ☆23Updated 2 weeks ago