klsecservices / AdvisoriesLinks
☆13Updated 2 months ago
Alternatives and similar repositories for Advisories
Users that are interested in Advisories are comparing it to the libraries listed below
Sorting:
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- HN Security's advisories.☆22Updated last month
- An automated setup for compiling & fuzzing Apache httpd server☆51Updated 2 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- Files used for reproducing Fuzzware's experiments☆60Updated 2 years ago
- RTSPhuzz - An RTSP Fuzzer written using the Boofuzz framework☆49Updated 2 years ago
- ☆97Updated 4 years ago
- Read only mirror - No pull requests☆20Updated 4 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 5 years ago
- ☆33Updated last month
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Updated last week
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 5 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Updated 3 years ago
- 👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.☆34Updated 4 years ago
- ☆38Updated 3 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆71Updated 4 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- #INFILTRATE20 raptor's party pack.☆29Updated last month
- ☆17Updated 7 years ago
- ☆18Updated 5 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆29Updated 3 years ago
- Default query sets for Joern☆26Updated 4 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆130Updated 3 years ago
- ☆96Updated 5 years ago
- Vagrant setup for building a machine for CTF/exploit development☆21Updated 6 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- Debugger for the Shannon Baseband☆58Updated 5 years ago