maddiestone / ConPresentationsLinks
Slide decks from my conference presentations
☆367Updated 2 years ago
Alternatives and similar repositories for ConPresentations
Users that are interested in ConPresentations are comparing it to the libraries listed below
Sorting:
- Frida Boot 👢- A binary instrumentation workshop, with Frida, for beginners!☆317Updated 2 years ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆425Updated 3 years ago
- Project Zero Docs and Tools☆805Updated 2 months ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆846Updated 5 years ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆222Updated 2 years ago
- repository for kernel exploit practice☆411Updated 6 years ago
- Android Kernel Exploitation☆632Updated 3 years ago
- A Binary Ninja plugin for vulnerability research.☆298Updated last year
- How to build an efficient pwn development environment in 2020☆268Updated 4 years ago
- Vulnerability examples.☆412Updated last year
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆577Updated 5 years ago
- An updated collection of resources targeting browser-exploitation.☆820Updated 4 years ago
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆335Updated 5 years ago
- VerSprite Security Research☆171Updated 2 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆278Updated 2 weeks ago
- A thorough library database to assist with binary exploitation tasks.☆195Updated 3 years ago
- INFILTRATE 2019 Demo Materials☆342Updated 2 years ago
- A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation☆232Updated 4 years ago
- Useful tips by OTA CTF members☆148Updated 6 years ago
- A curated list of different AFL forks and AFL inspired fuzzers with detailed equivalent academic papers and AFL-fuzzing tutorials☆554Updated last year
- Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities☆411Updated 4 years ago
- A happy heap editor to support your exploitation process☆197Updated 4 years ago
- Quarkslab conference talks☆309Updated 3 weeks ago
- r2con2019 - slides and materials☆137Updated 5 years ago
- ☆442Updated last year
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆710Updated last year
- fpicker is a Frida-based fuzzing suite supporting various modes (including AFL++ in-process fuzzing)☆286Updated 4 months ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆201Updated 3 years ago
- Linux kernel exploitation experiments☆378Updated this week
- ☆156Updated 3 years ago