maddiestone / ConPresentations
Slide decks from my conference presentations
☆364Updated last year
Alternatives and similar repositories for ConPresentations:
Users that are interested in ConPresentations are comparing it to the libraries listed below
- Project Zero Docs and Tools☆731Updated 2 months ago
- Android Kernel Exploitation☆593Updated 2 years ago
- Frida Boot 👢- A binary instrumentation workshop, with Frida, for beginners!☆312Updated last year
- A Binary Ninja plugin for vulnerability research.☆286Updated 4 months ago
- Repository for information about 0-days exploited in-the-wild.☆769Updated 2 months ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆811Updated 4 years ago
- ☆432Updated 3 months ago
- An archive of low-level CTF challenges developed over the years☆614Updated 3 years ago
- INFILTRATE 2019 Demo Materials☆341Updated last year
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆417Updated 2 years ago
- A thorough library database to assist with binary exploitation tasks.☆196Updated 2 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆240Updated last month
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆429Updated 9 months ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆683Updated 3 months ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆712Updated 2 months ago
- Use angr in Ghidra☆564Updated 5 months ago
- A curated list of different AFL forks and AFL inspired fuzzers with detailed equivalent academic papers and AFL-fuzzing tutorials☆540Updated last year
- Vulnerability examples.☆402Updated 8 months ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆599Updated 6 months ago
- Quarkslab conference talks☆282Updated 2 weeks ago
- repository for kernel exploit practice☆394Updated 5 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆392Updated 4 years ago
- How to build an efficient pwn development environment in 2020☆259Updated 3 years ago
- A collection of pwn/CTF related utilities for Ghidra☆663Updated 4 months ago
- VerSprite Security Research☆165Updated last year
- A happy heap editor to support your exploitation process☆195Updated 3 years ago
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆338Updated 4 years ago
- AFL binary instrumentation☆294Updated this week
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆189Updated 2 years ago