niklasb / 3dpwn
VirtualBox 3D exploits & PoCs
☆159Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for 3dpwn
- ☆84Updated 8 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆130Updated 5 years ago
- Heap exploitation technique bypassing heap ASLR☆47Updated 5 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Updated 6 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆86Updated 5 years ago
- ☆100Updated 6 years ago
- Some kernel fuzzing paper about windows and linux☆253Updated 7 years ago
- Some new commands debug heap for peda☆98Updated 4 years ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆88Updated 6 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆88Updated 5 years ago
- Source code and exploits for some 35c3ctf challenges.☆136Updated 5 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆115Updated 5 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆244Updated 5 years ago
- ☆138Updated 7 years ago
- September Chrome 1day by István Kurucsai☆81Updated 5 years ago
- The Harvest of V8 regress.☆137Updated 4 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆159Updated 6 years ago
- ☆88Updated 5 years ago
- ☆53Updated 3 years ago
- Some kernel exploits☆142Updated 7 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 7 years ago
- JavaScript Engine Exploits in CTF☆3Updated 5 years ago
- WCTF 2019 challenge☆99Updated 5 years ago
- ☆121Updated 6 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆119Updated 6 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆80Updated 5 years ago
- ☆67Updated 4 years ago
- Repo for CSAW CTF 2018 Finals challenges☆56Updated 6 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆295Updated last year
- A tool for checking exploitability☆210Updated 5 years ago