klsecservices / Advisories
☆12Updated 2 months ago
Alternatives and similar repositories for Advisories:
Users that are interested in Advisories are comparing it to the libraries listed below
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆31Updated 4 years ago
- The Dumb Network Fuzzer☆20Updated last year
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- HN Security's advisories.☆22Updated 4 months ago
- ☆30Updated 5 months ago
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago
- ☆30Updated 3 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- A MBR Fuzzer☆29Updated 11 months ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Updated 3 months ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Updated 5 years ago
- RTSPhuzz - An RTSP Fuzzer written using the Boofuzz framework☆44Updated last year
- ☆16Updated 9 months ago
- ☆27Updated last year
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- ☆14Updated 2 years ago
- ☆20Updated 2 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆34Updated 3 years ago
- MacOS kernel memory leak (4 bytes)☆30Updated 4 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆26Updated last month
- Simple WebSocket fuzzer☆32Updated last year
- ☆17Updated 2 years ago
- ☆30Updated 2 months ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆18Updated 3 years ago
- ☆19Updated 2 years ago