niklasb / sploitsLinks
☆159Updated 6 years ago
Alternatives and similar repositories for sploits
Users that are interested in sploits are comparing it to the libraries listed below
Sorting:
- ☆90Updated 6 years ago
- PoC exploit for CVE-2016-4622☆110Updated 2 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 7 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆91Updated 6 years ago
- 3D Accelerated Exploitation☆53Updated 6 years ago
- PEDA-like debugger UI for WinDbg☆204Updated last year
- A BinaryNinja plugin to graph a BNIL instruction tree☆89Updated 2 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆89Updated 6 years ago
- ☆135Updated 5 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Updated 6 years ago
- ☆68Updated last year
- ☆87Updated last year
- ☆154Updated 6 years ago
- ☆92Updated 4 years ago
- WCTF 2019 challenge☆103Updated 6 years ago
- ☆183Updated 2 years ago
- ☆99Updated 7 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- ☆105Updated 5 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆113Updated 7 years ago
- ☆96Updated 4 years ago
- ☆26Updated 7 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 8 months ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆51Updated 7 years ago
- Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018☆179Updated last year
- Just a repo for random tools we have developed related to vulnerability research and exploit development.☆24Updated 4 years ago
- Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf☆60Updated 6 years ago
- Source code and exploits for some 35c3ctf challenges.☆142Updated 6 years ago
- haze binary fuzzer☆54Updated last year
- Toolkit for Hyper-V security research☆156Updated 3 years ago