maddiestone / ConPresentationsLinks
Slide decks from my conference presentations
β365Updated last year
Alternatives and similar repositories for ConPresentations
Users that are interested in ConPresentations are comparing it to the libraries listed below
Sorting:
- Frida Boot π’- A binary instrumentation workshop, with Frida, for beginners!β318Updated last year
- Project Zero Docs and Toolsβ778Updated 2 months ago
- A thorough library database to assist with binary exploitation tasks.β198Updated 2 years ago
- repository for kernel exploit practiceβ402Updated 5 years ago
- INFILTRATE 2019 Demo Materialsβ339Updated 2 years ago
- A Binary Ninja plugin for vulnerability research.β294Updated 10 months ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-conceptsβ423Updated 3 years ago
- Android Kernel Exploitationβ617Updated 3 years ago
- Useful tips by OTA CTF membersβ144Updated 5 years ago
- Vulnerability examples.β406Updated last year
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.β218Updated 2 years ago
- How to build an efficient pwn development environment in 2020β264Updated 4 years ago
- β440Updated 9 months ago
- Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilitiesβ410Updated 4 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.β259Updated 7 months ago
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOSβ338Updated 5 years ago
- A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitationβ232Updated 4 years ago
- VerSprite Security Researchβ170Updated 2 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learningβ827Updated 5 years ago
- Exploiting challenges in Linux and Windowsβ122Updated 5 years ago
- FitM, the Fuzzer in the Middle, can fuzz client and server binaries at the same time using userspace snapshot-fuzzing and network emulatiβ¦β292Updated 3 years ago
- SSD Secure Disclosure Advisoriesβ169Updated 5 years ago
- Linux kernel exploitation experimentsβ279Updated 3 weeks ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwningβ197Updated 2 years ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.β699Updated 8 months ago
- A curated list of different AFL forks and AFL inspired fuzzers with detailed equivalent academic papers and AFL-fuzzing tutorialsβ547Updated last year
- r2con2019 - slides and materialsβ138Updated 5 years ago
- An Android CTF practice challengeβ112Updated 6 years ago
- Quarkslab conference talksβ299Updated 2 weeks ago
- An updated collection of resources targeting browser-exploitation.β817Updated 4 years ago