opensrcsec / same_type_object_reuse_exploitsLinks
PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse
☆30Updated 2 years ago
Alternatives and similar repositories for same_type_object_reuse_exploits
Users that are interested in same_type_object_reuse_exploits are comparing it to the libraries listed below
Sorting:
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated last year
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆42Updated 4 years ago
- ☆19Updated 3 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- ☆33Updated 8 months ago
- ☆19Updated 2 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- ☆16Updated last year
- ☆33Updated 5 months ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆28Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- ☆20Updated 3 years ago
- Here I store my proof of concepts☆14Updated last year
- ☆66Updated 2 years ago
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- harness for fuzzing with winafl. both public and my own which i have released.☆58Updated 4 years ago
- ☆60Updated last year
- Investigating the bug behind CVE-2021-26708☆28Updated 4 years ago
- ☆32Updated 2 years ago
- WebGL fuzzer☆39Updated 2 years ago
- ☆71Updated 2 years ago
- Linux Kernel N-day Exploit/Analysis.☆67Updated 10 months ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Updated 2 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Updated 5 years ago
- ☆14Updated 2 years ago
- Proof of concept code for CVE-2023-2008☆41Updated 2 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42Updated 2 years ago