niklasb / sploits
☆159Updated 5 years ago
Alternatives and similar repositories for sploits
Users that are interested in sploits are comparing it to the libraries listed below
Sorting:
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Updated 5 years ago
- PoC exploit for CVE-2016-4622☆107Updated last year
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 6 years ago
- ☆99Updated 6 years ago
- ☆90Updated 6 years ago
- ☆135Updated 5 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆90Updated 6 years ago
- PEDA-like debugger UI for WinDbg☆204Updated last year
- A BinaryNinja plugin to graph a BNIL instruction tree☆86Updated last year
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆87Updated 6 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆113Updated 7 years ago
- Some new commands debug heap for peda☆99Updated last month
- Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018☆181Updated last year
- ☆96Updated 4 years ago
- ☆122Updated 7 years ago
- Source code and exploits for some 35c3ctf challenges.☆139Updated 6 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆109Updated 5 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- ☆85Updated last year
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆89Updated 6 years ago
- September Chrome 1day by István Kurucsai☆81Updated 5 years ago
- ☆154Updated 6 years ago
- WCTF 2019 challenge☆100Updated 5 years ago
- A DBI tool to discover heap memory related bugs☆125Updated 6 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆125Updated last year
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆119Updated 7 years ago
- Transfer analysis data between Binary Ninja and IDA☆133Updated 7 months ago
- Attacking the Core associated source files☆89Updated 7 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago