nafiez / Vulnerability-ResearchLinks
☆78Updated 4 months ago
Alternatives and similar repositories for Vulnerability-Research
Users that are interested in Vulnerability-Research are comparing it to the libraries listed below
Sorting:
- ☆30Updated 3 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- ☆32Updated 6 months ago
- ☆56Updated 3 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- My public presentations☆41Updated 2 years ago
- MacOS kernel memory leak (4 bytes)☆30Updated 5 years ago
- Some exploits I have written to showcase and to share☆53Updated 4 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 3 years ago
- My conference presentations and Materials for them.☆32Updated 2 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆47Updated 4 years ago
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆35Updated 4 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- ☆15Updated last year
- MacOSX Privilege Escalation Research☆31Updated 3 years ago
- I will provide details and pocs for some bugs I found.☆38Updated last year
- ☆18Updated 3 years ago
- PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.☆74Updated 3 years ago
- ☆49Updated 6 years ago
- #INFILTRATE20 raptor's party pack.☆28Updated last year
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- ☆14Updated 2 years ago
- Collection of slides☆33Updated last year
- ☆17Updated 3 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆14Updated 5 years ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Updated last year
- ☆34Updated 4 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago