Improvised json-based configurable Windows sandbox
☆11Sep 29, 2020Updated 5 years ago
Alternatives and similar repositories for sandbox
Users that are interested in sandbox are comparing it to the libraries listed below
Sorting:
- A simple tool to help you capture Ioctls.☆20Aug 26, 2017Updated 8 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆29Jul 1, 2013Updated 12 years ago
- ☆18May 18, 2018Updated 7 years ago
- ☆15Jun 11, 2022Updated 3 years ago
- dc2020 quals kernel pwn☆12May 18, 2020Updated 5 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- OpenSandbox build on Eashhook library and C#, it allow you to run windows applications in a sandboxed environment☆17Jun 25, 2013Updated 12 years ago
- ☆17May 13, 2019Updated 6 years ago
- Using simple seccomp filters☆26Aug 5, 2012Updated 13 years ago
- WIP - Play with Intel VM Extensions☆23Jun 12, 2017Updated 8 years ago
- exploit code for a bpf heap overflow vulnerability☆28Sep 3, 2019Updated 6 years ago
- ☆28Aug 19, 2019Updated 6 years ago
- radare2 cLEMENCy plugins☆24Nov 5, 2017Updated 8 years ago
- Modified from pwndbg. Enhance the UI part for better usage.☆26Jun 14, 2019Updated 6 years ago
- A stripped-down LLD (LLVM linker)☆30Apr 11, 2020Updated 5 years ago
- Tool for detecting error handling bugs☆23Sep 11, 2016Updated 9 years ago
- My CTF writeup☆26Mar 20, 2017Updated 8 years ago
- ☆55Mar 30, 2020Updated 5 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆36Dec 31, 2016Updated 9 years ago
- PARTS / LLVM compiler☆31Aug 14, 2019Updated 6 years ago
- Soruce code, infrastructure and exploits for the 35C3 CTF challenges newphonewhodis and identitytheft☆27Apr 24, 2019Updated 6 years ago
- HCTF 2016 CHALLENGES☆114Nov 30, 2016Updated 9 years ago
- realworld ctf live stream☆74Feb 4, 2024Updated 2 years ago
- ☆68Apr 27, 2020Updated 5 years ago
- ☆37Feb 19, 2020Updated 6 years ago
- Processes and visualizes maps (aka hidden classes) created by v8 during execution.☆35Apr 26, 2018Updated 7 years ago
- Collection of software bugs found by SkyLined☆68Nov 10, 2016Updated 9 years ago
- QEMU-based framework exposing several of QEMU-internal APIs to a LuaJIT core injected into QEMU itself. Among other things, this allows f…☆154Sep 21, 2018Updated 7 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Sep 10, 2016Updated 9 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Jun 11, 2022Updated 3 years ago
- An ambitious project to make an easy-to-use but powerful reverse-engineering tool.☆10Oct 13, 2022Updated 3 years ago
- ☆17Jan 1, 2021Updated 5 years ago
- PDU encode/decode☆14May 12, 2010Updated 15 years ago
- CTF Challenge Framework for Windows 8 and above☆156Jul 14, 2021Updated 4 years ago
- A collection of more than 1000 binary libc files☆90Mar 26, 2015Updated 10 years ago
- Black Hat 2016 Slides, Paper and Code☆83Aug 10, 2016Updated 9 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago