marcinguy / kernel-exploitation
☆16Updated this week
Related projects: ⓘ
- ☆16Updated 3 years ago
- Version of Binnavi used for the thesis "Finding the needle in the heap : combining binary analysis techniques to trigger use-after-free"☆10Updated 6 years ago
- A fuzzer for HTML5 canvas operations.☆10Updated 7 years ago
- ☆11Updated 6 years ago
- ☆14Updated 6 years ago
- ☆14Updated 6 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Updated 9 years ago
- CVE-2018-4330 POC for iOS☆18Updated 6 years ago
- keynote I gave at GreHack 2019☆18Updated 4 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 9 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 4 years ago
- ROP Payload Compiler☆11Updated 7 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆22Updated 6 years ago
- Reverse engineering toolkit for exploit/malware analysis☆34Updated 4 years ago
- CTF writeups☆9Updated 4 years ago
- ☆22Updated 6 years ago
- PoC code for CVE-2018-9539☆18Updated 5 years ago
- A stateful fuzzing engine.☆45Updated 5 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 6 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 7 years ago
- ☆12Updated 6 years ago
- ☆9Updated 5 years ago
- A Modern Approach☆10Updated 9 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Updated 6 years ago
- ☆14Updated last year
- ☆12Updated this week
- ☆14Updated this week
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Updated 6 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 5 years ago