maddiestone / ConPresentationsLinks
Slide decks from my conference presentations
☆366Updated last year
Alternatives and similar repositories for ConPresentations
Users that are interested in ConPresentations are comparing it to the libraries listed below
Sorting:
- Frida Boot 👢- A binary instrumentation workshop, with Frida, for beginners!☆318Updated last year
- Project Zero Docs and Tools☆781Updated 2 months ago
- A Binary Ninja plugin for vulnerability research.☆296Updated 11 months ago
- Android Kernel Exploitation☆620Updated 3 years ago
- A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation☆232Updated 4 years ago
- A thorough library database to assist with binary exploitation tasks.☆198Updated 3 years ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆424Updated 3 years ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆219Updated 2 years ago
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆338Updated 5 years ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆704Updated 9 months ago
- repository for kernel exploit practice☆406Updated 5 years ago
- How to build an efficient pwn development environment in 2020☆264Updated 4 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆830Updated 5 years ago
- Useful tips by OTA CTF members☆144Updated 5 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆258Updated 8 months ago
- Vulnerability examples.☆408Updated last year
- ☆182Updated 5 years ago
- r2con2019 - slides and materials☆138Updated 5 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆197Updated 3 years ago
- A happy heap editor to support your exploitation process☆196Updated 4 years ago
- VerSprite Security Research☆170Updated 2 years ago
- Exploitation and Mitigation Slides☆129Updated last year
- INFILTRATE 2019 Demo Materials