☆11May 19, 2017Updated 8 years ago
Alternatives and similar repositories for mruby-workshop
Users that are interested in mruby-workshop are comparing it to the libraries listed below
Sorting:
- use afl to fuzz swift program☆24Nov 3, 2017Updated 8 years ago
- Cross debugger suite☆20Jul 9, 2021Updated 4 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- Fuzzing results for various interpreters.☆82Apr 26, 2018Updated 7 years ago
- A fuzz job for ClamAV☆32Jun 13, 2016Updated 9 years ago
- A demo project for AFL with QEMU Augmented Instrumentation (qai)☆44Nov 22, 2016Updated 9 years ago
- windows kernel vulnerability found by me☆90Aug 28, 2017Updated 8 years ago
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- Code to fuzz bignum libraries☆46Nov 11, 2018Updated 7 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- Unofficial American Fuzzy Lop repo☆35Mar 24, 2017Updated 8 years ago
- Experiments in trying to find 0-days in numpy☆38Jul 1, 2017Updated 8 years ago
- A python library to find one-gadget☆31Feb 22, 2019Updated 7 years ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Sep 21, 2017Updated 8 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Feb 22, 2013Updated 13 years ago
- softScheck Cloud Fuzzing Framework☆58Jan 26, 2018Updated 8 years ago
- python inspect rootkit tool☆33Oct 17, 2013Updated 12 years ago
- JEB Scripts☆21Nov 28, 2014Updated 11 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 6 years ago
- Pixel bootlaoder exploit for reading flash storage☆31Jan 5, 2017Updated 9 years ago
- A generic mark-and-sweep garbage collector☆44Jan 20, 2012Updated 14 years ago
- Nsolv - A front-end that allows multiple SMTLIBv2 compliant solvers to executed in parallel.☆11Dec 7, 2012Updated 13 years ago
- Symbolic Execution for WebAssembly☆10Jun 10, 2018Updated 7 years ago
- A fuzzer. Work in progress!☆21Sep 8, 2017Updated 8 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Feb 7, 2017Updated 9 years ago
- ☆32Nov 15, 2017Updated 8 years ago
- ☆31Jun 18, 2020Updated 5 years ago
- ☆18Feb 6, 2019Updated 7 years ago
- EPWING dictionary viewer☆11Nov 13, 2018Updated 7 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Some stuff for CTF.☆10Oct 27, 2019Updated 6 years ago
- Modified from pwndbg. Enhance the UI part for better usage.☆26Jun 14, 2019Updated 6 years ago
- My CTF writeup☆26Mar 20, 2017Updated 8 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Apr 5, 2018Updated 7 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago