maddiestone / ConPresentationsLinks
Slide decks from my conference presentations
☆367Updated 2 years ago
Alternatives and similar repositories for ConPresentations
Users that are interested in ConPresentations are comparing it to the libraries listed below
Sorting:
- Frida Boot 👢- A binary instrumentation workshop, with Frida, for beginners!☆318Updated 2 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆853Updated 5 years ago
- Project Zero Docs and Tools☆827Updated this week
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆424Updated 3 years ago
- A Binary Ninja plugin for vulnerability research.☆300Updated last year
- A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation☆234Updated 5 years ago
- Android Kernel Exploitation☆638Updated 3 years ago
- How to build an efficient pwn development environment in 2020☆269Updated 5 years ago
- repository for kernel exploit practice☆414Updated 6 years ago
- An updated collection of resources targeting browser-exploitation.☆825Updated 4 years ago
- A thorough library database to assist with binary exploitation tasks.☆194Updated 3 years ago
- Useful tips by OTA CTF members☆150Updated 6 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆579Updated 5 years ago
- VerSprite Security Research☆171Updated 3 years ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆223Updated 2 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆283Updated this week
- r2con2019 - slides and materials☆137Updated 5 years ago
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆335Updated 5 years ago
- Fuzzing harness for testing proprietary image codecs supported by Skia on Android☆353Updated 5 years ago
- INFILTRATE 2019 Demo Materials☆342Updated 2 years ago
- Exploiting challenges in Linux and Windows☆121Updated 6 years ago
- Vulnerability examples.☆413Updated last week
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆202Updated 3 years ago
- A happy heap editor to support your exploitation process☆198Updated 4 years ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆716Updated last year
- Exploitation and Mitigation Slides☆135Updated last year
- Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities☆411Updated 4 years ago
- Frida-based general purpose fuzzer☆221Updated 5 years ago
- Quarkslab conference talks☆312Updated 2 months ago
- ☆157Updated 3 years ago