perfectblue / defcon-2018Links
DEFCON 2018 Qualification writeups
☆13Updated 7 years ago
Alternatives and similar repositories for defcon-2018
Users that are interested in defcon-2018 are comparing it to the libraries listed below
Sorting:
- ☆33Updated 5 years ago
- CTF binary exploit code☆38Updated 6 years ago
- by http://whereisk0shl.top/☆35Updated 6 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆60Updated 6 years ago
- keynote I gave at GreHack 2019☆18Updated 5 years ago
- ARG: Automatic ROP chains Generation☆22Updated 5 years ago
- HITCON CTF 2018☆45Updated 6 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- ☆50Updated 5 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Updated 5 years ago
- Some writeups in ctf.☆11Updated 3 years ago
- Tools released in CSS 2019☆38Updated 5 years ago
- Automatically generate ASM.JS JIT-Spray payloads☆36Updated 7 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 5 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Updated 5 years ago
- Fuzzing SILK with AFL☆25Updated 5 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 6 years ago
- ASLR bypass in Chrome version 77☆24Updated 5 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- Magellan PoC☆34Updated 6 years ago
- ☆37Updated 5 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- adobe afdko fuzz☆41Updated 5 years ago
- exploit development☆49Updated 7 years ago
- Python module to help in exploitation of the FILE structure in C☆26Updated 6 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- ☆22Updated 6 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Updated 6 years ago
- My public CTF challenge☆11Updated 2 years ago
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Updated 6 years ago