o-o-overflow / dc2019f-super-smash-ooosView external linksLinks
☆28Aug 19, 2019Updated 6 years ago
Alternatives and similar repositories for dc2019f-super-smash-ooos
Users that are interested in dc2019f-super-smash-ooos are comparing it to the libraries listed below
Sorting:
- ☆17May 13, 2019Updated 6 years ago
- Improvised json-based configurable Windows sandbox☆11Sep 29, 2020Updated 5 years ago
- funky fun fuzzer☆11Jul 6, 2021Updated 4 years ago
- ☆47Dec 29, 2018Updated 7 years ago
- Port of the classic first-person-shooter DOOM to Xbox for DEFCON 27 CTF☆26Aug 20, 2019Updated 6 years ago
- Repo for CSAW CTF 2018 Finals challenges☆55Nov 17, 2018Updated 7 years ago
- ☆13May 16, 2019Updated 6 years ago
- Soruce code, infrastructure and exploits for the 35C3 CTF challenges newphonewhodis and identitytheft☆27Apr 24, 2019Updated 6 years ago
- ☆20Apr 10, 2025Updated 10 months ago
- Proof of Concept of TrustZone exploit☆16Aug 10, 2025Updated 6 months ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Jan 26, 2019Updated 7 years ago
- Challenges I created for 35c3☆48Dec 31, 2018Updated 7 years ago
- Load function names from an IDA Pro database inside GDB☆21Oct 20, 2018Updated 7 years ago
- Tool to test different CTF scoring algorithms on real data☆17May 3, 2021Updated 4 years ago
- An AFL scaling benchmarking tool☆18May 29, 2020Updated 5 years ago
- A tool to interactively explore the heap of a python process☆25Dec 29, 2020Updated 5 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Feb 15, 2019Updated 7 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Dec 30, 2016Updated 9 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- OCaml code for generating and analysing pcap (packet capture) files☆20May 31, 2025Updated 8 months ago
- kilroy☆39Jun 23, 2014Updated 11 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆29Jul 1, 2013Updated 12 years ago
- Solutions for my 34C3CTF challenges☆21Jul 9, 2018Updated 7 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Jul 20, 2019Updated 6 years ago
- Source code and exploits for some 35c3ctf challenges.☆143Dec 30, 2018Updated 7 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆58Jan 5, 2019Updated 7 years ago
- Using simple seccomp filters☆26Aug 5, 2012Updated 13 years ago
- a list of web browser vulnerabilities☆20May 10, 2020Updated 5 years ago
- Binary Ninja Debugger Plugin☆143Apr 21, 2022Updated 3 years ago
- Collection of CTF challenges I made☆17Apr 2, 2018Updated 7 years ago
- TyphoonCon 2019☆53Aug 8, 2019Updated 6 years ago
- A tool to parse Apple's binary device tree format.☆57Apr 19, 2020Updated 5 years ago
- Debugger for the Shannon Baseband☆58Jun 15, 2020Updated 5 years ago
- ☆29Jul 4, 2018Updated 7 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 7 years ago
- CVE-2022-46718: an app may be able to read sensitive location information.☆27May 1, 2023Updated 2 years ago
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- An AFL implementation with UnTracer (our coverage-guided tracer)☆124Jul 7, 2022Updated 3 years ago