ptr-yudai / House-of-HuskView external linksLinks
PoC for House of Husk Exploit
☆13Apr 3, 2020Updated 5 years ago
Alternatives and similar repositories for House-of-Husk
Users that are interested in House-of-Husk are comparing it to the libraries listed below
Sorting:
- ☆12Sep 8, 2020Updated 5 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- ☆18Aug 14, 2019Updated 6 years ago
- Exploit Firefox Vulnerability☆24May 25, 2020Updated 5 years ago
- An unauthenticated PoC for CVE-2020-0796☆22Mar 15, 2020Updated 5 years ago
- ☆27Dec 12, 2018Updated 7 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- PoC code for CVE-2019-14040☆27Apr 15, 2020Updated 5 years ago
- CVE-2020-8597 pppd buffer overflow poc☆49Mar 12, 2020Updated 5 years ago
- experimentation/code from Tanguy Dubroca (summer 2019)☆28Aug 10, 2019Updated 6 years ago
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 5 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- dc2020 quals kernel pwn☆12May 18, 2020Updated 5 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆89Nov 7, 2025Updated 3 months ago
- All virtualization escape challenges and writeups in RealWorldCTF☆89Jan 14, 2019Updated 7 years ago
- ☆33Nov 14, 2025Updated 3 months ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆34Jan 22, 2021Updated 5 years ago
- ☆13Jun 26, 2019Updated 6 years ago
- Simple Simulator of ARMv6m instructions☆17May 23, 2017Updated 8 years ago
- GDB Python scripts targetting Fennec development☆22Jan 19, 2018Updated 8 years ago
- PARTS / LLVM compiler☆31Aug 14, 2019Updated 6 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Oct 23, 2014Updated 11 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- ☆13Dec 14, 2021Updated 4 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- ☆60Sep 27, 2023Updated 2 years ago
- This is the artifact for paper “Automated Testing of Software that Uses Machine Learning APIs (#158)” in ICSE2022☆12Nov 15, 2022Updated 3 years ago
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆17Oct 19, 2020Updated 5 years ago
- My-CTF-Challenges☆15Sep 27, 2021Updated 4 years ago
- ☆14Jun 21, 2020Updated 5 years ago
- ☆227Dec 9, 2020Updated 5 years ago
- DC28CTF challenge parallel-af. Dataflow machine.☆59Aug 10, 2020Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆40May 13, 2019Updated 6 years ago
- Analyze IoT firmware☆17Apr 24, 2021Updated 4 years ago
- My public CTF challenge☆17Aug 25, 2025Updated 5 months ago
- A testcase generation tool for Persistent Memory Programs.☆15Jul 19, 2021Updated 4 years ago