PoC for House of Husk Exploit
☆13Apr 3, 2020Updated 5 years ago
Alternatives and similar repositories for House-of-Husk
Users that are interested in House-of-Husk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- ☆27Dec 12, 2018Updated 7 years ago
- A Binary Ninja plugin providing a set of BinaryViews for loading Motorola SREC, Intel HEX, and TI-TXT "hex" files☆10Sep 5, 2024Updated last year
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- An unauthenticated PoC for CVE-2020-0796☆22Mar 15, 2020Updated 6 years ago
- Exploit Firefox Vulnerability☆24May 25, 2020Updated 5 years ago
- ☆33Nov 14, 2025Updated 4 months ago
- ☆18Aug 14, 2019Updated 6 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- PoC code for CVE-2019-14040☆27Apr 15, 2020Updated 5 years ago
- ☆60Sep 27, 2023Updated 2 years ago
- experimentation/code from Tanguy Dubroca (summer 2019)☆28Aug 10, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- All virtualization escape challenges and writeups in RealWorldCTF☆89Jan 14, 2019Updated 7 years ago
- ReCopilot IDA☆54Jan 12, 2026Updated 2 months ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆90Nov 7, 2025Updated 4 months ago
- CVE-2020-8597 pppd buffer overflow poc☆49Mar 12, 2020Updated 6 years ago
- GDB Python scripts targetting Fennec development☆22Jan 19, 2018Updated 8 years ago
- dc2020 quals kernel pwn☆12May 18, 2020Updated 5 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- Analyze IoT firmware☆17Apr 24, 2021Updated 4 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 5 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- Egui DirectX9, DirectX10, DirectX11 Renderers and Win32 Input Handler☆15Jun 19, 2023Updated 2 years ago
- ☆28Dec 17, 2025Updated 3 months ago
- MessageBox files (EXE, DLL) for testing purposes.☆13Mar 9, 2019Updated 7 years ago
- My-CTF-Challenges☆15Sep 27, 2021Updated 4 years ago
- ☆27Apr 28, 2023Updated 2 years ago
- ☆39Jun 6, 2024Updated last year
- Firmware for the Zyxel VMG3925-B10B☆22Feb 12, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆52Jul 3, 2022Updated 3 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- The project black zone☆18Nov 9, 2017Updated 8 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Aug 18, 2019Updated 6 years ago
- ☆14Jun 21, 2020Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- Script to setup pwn environment with Docker☆49Jan 10, 2026Updated 2 months ago