maddiestone / ConPresentations
Slide decks from my conference presentations
β363Updated last year
Alternatives and similar repositories for ConPresentations:
Users that are interested in ConPresentations are comparing it to the libraries listed below
- Frida Boot π’- A binary instrumentation workshop, with Frida, for beginners!β312Updated last year
- Vulnerability examples.β402Updated 9 months ago
- repository for kernel exploit practiceβ392Updated 5 years ago
- Android Kernel Exploitationβ597Updated 3 years ago
- A Binary Ninja plugin for vulnerability research.β288Updated 5 months ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learningβ813Updated 4 years ago
- Quarkslab conference talksβ284Updated last week
- Project Zero Docs and Toolsβ733Updated 2 months ago
- β435Updated 4 months ago
- An updated collection of resources targeting browser-exploitation.β812Updated 3 years ago
- Repository for information about 0-days exploited in-the-wild.β778Updated 2 weeks ago
- VerSprite Security Researchβ165Updated 2 years ago
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOSβ339Updated 4 years ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address aβ¦β430Updated 10 months ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.β239Updated 2 months ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwningβ192Updated 2 years ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.β685Updated 3 months ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.β573Updated 4 years ago
- INFILTRATE 2019 Demo Materialsβ341Updated last year
- Exploiting challenges in Linux and Windowsβ122Updated 5 years ago
- A thorough library database to assist with binary exploitation tasks.β196Updated 2 years ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-conceptsβ417Updated 2 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, anβ¦β182Updated 11 months ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Previewβ715Updated 3 months ago
- This repository contains the tools we used in our research on the Google Titan M chipβ184Updated 2 years ago
- β182Updated 5 years ago
- A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitationβ231Updated 4 years ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.β212Updated last year
- β182Updated 7 years ago
- A collection of my Semgrep rules to facilitate vulnerability research.β603Updated 7 months ago