Automatically exported from code.google.com/p/it-sec-catalog,new version: https://it-sec-catalog.info/.
☆39Apr 24, 2015Updated 10 years ago
Alternatives and similar repositories for it-sec-catalog
Users that are interested in it-sec-catalog are comparing it to the libraries listed below
Sorting:
- cve2014-3153 exploit for ubuntu x86☆18Jan 24, 2015Updated 11 years ago
- ☆13Dec 17, 2015Updated 10 years ago
- a repo of links to useful writeups of pwn challenges☆31Jul 22, 2018Updated 7 years ago
- Terminal Forensics CheatSheets☆13Jul 28, 2015Updated 10 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- ☆43Nov 5, 2018Updated 7 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- 告别意外通话☆18Jan 6, 2016Updated 10 years ago
- ☆105Dec 9, 2019Updated 6 years ago
- Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018☆180Feb 7, 2024Updated 2 years ago
- This repo contains Writeups for the 35C3CTF.☆48Jan 4, 2019Updated 7 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- ☆49Feb 16, 2018Updated 8 years ago
- exploit development☆49Mar 14, 2018Updated 7 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆96Nov 4, 2021Updated 4 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆20Jul 6, 2018Updated 7 years ago
- Fix API against Themida API Redirection/Jump Trick with Cheat Engine Lua Script☆31Jun 23, 2020Updated 5 years ago
- Fuzzing Browsers☆316Dec 5, 2022Updated 3 years ago
- Analysis of VBS exploit CVE-2018-8174☆31Jul 12, 2018Updated 7 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Jun 14, 2017Updated 8 years ago
- ☆22Sep 17, 2019Updated 6 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆112Jul 25, 2019Updated 6 years ago
- not a jailbreak☆36Jan 4, 2018Updated 8 years ago
- Automatically generate ASM.JS JIT-Spray payloads☆36Mar 14, 2018Updated 7 years ago
- ☆34Apr 18, 2020Updated 5 years ago
- Exploitation challenges for CTF☆63Feb 13, 2018Updated 8 years ago
- Presented hardware reverse engineering workshops since 2019☆62Aug 8, 2024Updated last year
- Crane POAM Automation Tool (C-PAT™)☆15Updated this week
- ☆10Aug 4, 2020Updated 5 years ago
- Cross Platform Kernel Fuzzer Framework☆457Oct 11, 2018Updated 7 years ago
- ☆67Sep 3, 2020Updated 5 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆114Mar 5, 2018Updated 8 years ago
- Vulnerability Research and Proof of Concept exploits for various targets☆35Jan 4, 2023Updated 3 years ago
- A fully automatic fuzzing tool for Valgrind, unofficial mirror for http://esec-lab.sogeti.com/pages/fuzzgrind.html☆36Aug 5, 2015Updated 10 years ago
- ☆28Oct 4, 2018Updated 7 years ago
- Slides, exploits and PoCs :)☆94Jan 12, 2019Updated 7 years ago
- paste string formatted byte data block into x64dbg easy.☆42Jan 2, 2021Updated 5 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Jul 18, 2015Updated 10 years ago