nstarke / nstarke.github.ioLinks
github pages repository
☆14Updated 2 months ago
Alternatives and similar repositories for nstarke.github.io
Users that are interested in nstarke.github.io are comparing it to the libraries listed below
Sorting:
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆35Updated 4 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 4 years ago
- Research tools developed for Intel Wi-Fi chips☆57Updated 7 months ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- ☆38Updated last year
- Breaking Secure Boot with SMM☆41Updated 3 years ago
- ☆133Updated 2 weeks ago
- Linux Kernel N-day Exploit/Analysis.☆67Updated last year
- One Bootloader to Load Them All - Research materials, Code , Etc.☆63Updated 3 years ago
- iTLB multihit PoC☆42Updated 2 years ago
- Reverse engineering software using a full system simulator☆191Updated 2 weeks ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 7 years ago
- Helper plugin for analyzing UEFI firmware☆89Updated last year
- Kernel Read Write Execute☆46Updated last year
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31Updated 3 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- Collection of my slide decks☆109Updated 6 years ago
- Curated collection of resources, examples and scripts for Linux kernel devs, researchers and hobbyists.☆62Updated 3 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- ☆38Updated 3 years ago
- Slides about HyperDbg☆40Updated 6 months ago
- ☆45Updated 4 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 5 years ago
- VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/def…☆14Updated 5 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆50Updated 3 years ago
- Python interface for Binexport, the Bindiff export format☆20Updated last month
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- ugly code to check linux kernel memory and dump some internal structures☆48Updated last year
- The Dumb Network Fuzzer☆20Updated 2 years ago