marche147 / sandbox
Improvised json-based configurable Windows sandbox
☆10Updated 3 years ago
Related projects: ⓘ
- ☆8Updated 7 years ago
- radare2 cLEMENCy plugins☆23Updated 6 years ago
- ☆18Updated 6 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 7 years ago
- 翻译文章,CVE-2015-0057漏洞在32位和64位系统上的利用。Exploiting the win32k!xxxEnableWndSBArrows use-after-free (CVE 2015-0057) bug on both 32-bit and 64-b…☆23Updated 8 years ago
- ☆19Updated this week
- code emulator base on unicorn engine☆50Updated 6 years ago
- by http://whereisk0shl.top/☆35Updated 6 years ago
- ☆31Updated 6 years ago
- ☆13Updated 6 years ago
- Security introduction book☆23Updated 8 years ago
- PoC for CVE-2017-0075☆36Updated 5 years ago
- ☆12Updated this week
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Updated 7 years ago
- S2E plugins library☆17Updated 4 years ago
- Slides of 44Con 2018☆21Updated 5 years ago
- Windows builds for use with angr framework☆27Updated 8 years ago
- ☆18Updated this week
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Updated 5 years ago
- Tools released in CSS 2019☆38Updated 5 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 4 years ago
- AllMemPro☆43Updated 6 years ago
- Crappy Win32k syscall fuzzer☆13Updated 9 years ago
- ☆19Updated this week
- dc2020 quals kernel pwn☆11Updated 4 years ago
- ☆33Updated last year
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆21Updated 9 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Updated 5 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆27Updated 9 years ago
- plugin of ida with pin☆48Updated 3 years ago