niklasb / sploits
☆156Updated 5 years ago
Related projects: ⓘ
- ☆88Updated 5 years ago
- ☆133Updated 4 years ago
- PoC exploit for CVE-2016-4622☆103Updated last year
- This is collaborative work of Ned Williamson and Niklas Baumstark☆130Updated 5 years ago
- ☆100Updated 6 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆88Updated 5 years ago
- Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018☆178Updated 7 months ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆86Updated 5 years ago
- ☆121Updated 6 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆67Updated 6 years ago
- ☆94Updated 3 years ago
- 3D Accelerated Exploitation☆54Updated 5 years ago
- ☆151Updated 5 years ago
- ☆106Updated 4 years ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆85Updated 5 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆82Updated last year
- ☆82Updated 10 months ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆51Updated 6 years ago
- Source code and exploits for some 35c3ctf challenges.☆136Updated 5 years ago
- Slides, exploits and PoCs :)☆91Updated 5 years ago
- VirtualBox 3D exploits & PoCs☆159Updated 5 years ago
- "Pwntools does not support Windows. Use a real OS ;)" — Zach Riggle, 2015☆79Updated 5 years ago
- ☆89Updated 5 years ago
- WCTF 2019 challenge☆99Updated 5 years ago
- A collection of curated resources and CVEs I use for research.☆99Updated 3 years ago
- Attacking the Core associated source files☆86Updated 6 years ago
- ☆189Updated last year
- A code-searching/completion tool, for IDA APIs☆81Updated 2 years ago
- ☆91Updated 3 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆109Updated 6 months ago