My KVM breakout code from my DEFCON/Black Hat 2011 presentation
☆35Apr 9, 2014Updated 11 years ago
Alternatives and similar repositories for virtunoid
Users that are interested in virtunoid are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jul 9, 2018Updated 7 years ago
- PoCs for VMWare VGPU Direct 3D 10 vulnerabilities fixed in VMware Workstation 12.5.5 and 12.5.7☆36Jul 17, 2017Updated 8 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- ☆25Mar 18, 2018Updated 8 years ago
- Ghidra consonance and make it more ida-ish☆16Mar 11, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆100Aug 28, 2018Updated 7 years ago
- blog☆17Apr 27, 2020Updated 5 years ago
- 2019 Advent Calendar, vmware pwnables☆50Jul 21, 2020Updated 5 years ago
- RetDec Offline Decompiler☆46Feb 11, 2020Updated 6 years ago
- csie.ctf.tw☆15Jan 13, 2017Updated 9 years ago
- ☆19May 23, 2019Updated 6 years ago
- SECCON 2018 Online CTF 27-28 Oct. 2018☆37Nov 4, 2018Updated 7 years ago
- Shellcode Spider of Exploit-DB☆11Oct 17, 2017Updated 8 years ago
- Load function names from an IDA Pro database inside GDB☆21Oct 20, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ctf writeups☆19Sep 4, 2018Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Feb 4, 2020Updated 6 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆89Sep 5, 2018Updated 7 years ago
- QEMU with support for QDSP6 user mode emulation☆33Oct 4, 2019Updated 6 years ago
- Yet another CTF Platform☆22May 24, 2016Updated 9 years ago
- ☆39May 31, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- TCACHE (thread local caching in glibc malloc) attack vector common in heap exploitation☆12Apr 6, 2018Updated 7 years ago
- ☆40Dec 29, 2017Updated 8 years ago
- The Linux Scheduler Simulator☆12Dec 20, 2010Updated 15 years ago
- ctf writeup and log☆48Nov 30, 2024Updated last year
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 5 years ago
- An embedded operating system kernel☆15Jul 2, 2017Updated 8 years ago
- Heap exploitation technique bypassing heap ASLR☆49Sep 2, 2019Updated 6 years ago
- Challenges and solutions for Maple CTF 2022.☆28Sep 15, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Virtio in userspace☆12Nov 8, 2011Updated 14 years ago
- Dice CTF 2022 breach write-up☆15Feb 14, 2022Updated 4 years ago
- ☆13Dec 14, 2021Updated 4 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Website for the Underhanded Rust Contest☆13Mar 8, 2017Updated 9 years ago
- As it is obvious from the name this is version of NSA Ghidra which actually could be built from sources☆24Nov 3, 2021Updated 4 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆43Dec 16, 2024Updated last year