mdowd79 / presentationsLinks
☆79Updated last year
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below
Sorting:
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆72Updated 4 years ago
- ☆70Updated 11 months ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆146Updated 3 years ago
- Leveraging patch diffing to discover new vulnerabilities☆138Updated last year
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆46Updated 3 years ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆69Updated last year
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- Linux Kernel N-day Exploit/Analysis.☆67Updated last year
- Ghidra scripts for recovering string definitions in Go binaries☆127Updated 2 months ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Binary Exploitation Phrack CTF Challenge☆70Updated 5 months ago
- macOS Security Research☆121Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 5 months ago
- WTF Snapshot fuzzing of macOS targets☆99Updated last year
- ☆120Updated 2 years ago
- WebGL fuzzer☆39Updated 2 years ago
- Coverage-Guided Greybox Distributed Fuzzer☆132Updated 9 months ago
- A MBR Fuzzer☆31Updated last year
- ☆50Updated 3 years ago
- Some presentations I did in the past☆64Updated 2 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 4 years ago
- ☆35Updated 11 months ago
- ☆130Updated 5 months ago
- ☆22Updated last month
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Updated last year
- HN Security's advisories.☆22Updated 2 months ago
- A tool for firmware cartography☆165Updated last month
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago