pwning challenge with a minimal hypervisor on apple hypervisor framework
☆13May 13, 2019Updated 6 years ago
Alternatives and similar repositories for dc2019q-rtooos
Users that are interested in dc2019q-rtooos are comparing it to the libraries listed below
Sorting:
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- ☆11Nov 19, 2017Updated 8 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- My CTF tools & some other stuff☆20Aug 12, 2024Updated last year
- 我的技术博客,记录成长☆25Jan 30, 2019Updated 7 years ago
- Add debugging tools to an existing initramfs, even if it is for a foreign architecture☆24Aug 28, 2024Updated last year
- ☆17May 13, 2019Updated 6 years ago
- Tasteless CTF 2019☆20Nov 6, 2019Updated 6 years ago
- This repo contains Writeups for the 35C3CTF.☆48Jan 4, 2019Updated 7 years ago
- Automatic Compartments for Embedded Systems☆24Mar 6, 2020Updated 6 years ago
- 微信支付宝个人收款码管理平台☆10Jun 17, 2020Updated 5 years ago
- All virtualization escape challenges and writeups in RealWorldCTF☆89Jan 14, 2019Updated 7 years ago
- Source code and exploits for some 35c3ctf challenges.☆143Dec 30, 2018Updated 7 years ago
- Heap exploitation technique bypassing heap ASLR☆49Sep 2, 2019Updated 6 years ago
- ☆29May 13, 2018Updated 7 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018☆180Feb 7, 2024Updated 2 years ago
- vmp3.2授权分析☆30Oct 29, 2018Updated 7 years ago
- ☆51Dec 20, 2025Updated 2 months ago
- Building optimized shellcode using GCC. Suited for learning assembly and playing with the ABI☆78May 16, 2018Updated 7 years ago
- keystone-engine bindings python. support Xcode10 compilation in Mojave. targets for ida macOS☆29Oct 24, 2021Updated 4 years ago
- ViDeZZo source code.☆39Apr 15, 2025Updated 10 months ago
- Implementation of attacks on cryptosystems☆76Jul 29, 2025Updated 7 months ago
- load macho files in memory without touching the Disk☆43Sep 16, 2022Updated 3 years ago
- A collection of Browser DOM Vulnerabilities with PoCs☆40Nov 20, 2018Updated 7 years ago
- ☆100Aug 28, 2018Updated 7 years ago
- Crypto coin mixer☆11Feb 14, 2018Updated 8 years ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆15Oct 16, 2025Updated 4 months ago
- streamlink-cam4 lets you follow and archive your selected models shows on www.cam4.com☆12Sep 18, 2021Updated 4 years ago
- C# .NET Attribute based command line argument parser☆13Dec 28, 2011Updated 14 years ago
- My public presentations☆42May 10, 2023Updated 2 years ago
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆15Jun 5, 2024Updated last year
- A more realistic demo of a buffer overflow cause by -ffast-math☆15Sep 10, 2022Updated 3 years ago
- ☆10Feb 8, 2024Updated 2 years ago
- Python scripts for easy and anonymous cam4 recordings.☆10Mar 18, 2024Updated last year
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- CVE-2018-3252-PoC☆74Dec 7, 2018Updated 7 years ago
- 最新漏洞收集、复现、漏洞环境☆10Mar 21, 2019Updated 6 years ago