radareorg / r2con2021
☆28Updated 3 years ago
Alternatives and similar repositories for r2con2021:
Users that are interested in r2con2021 are comparing it to the libraries listed below
- The Dumb Network Fuzzer☆20Updated last year
- ☆23Updated last month
- ☆17Updated 4 years ago
- Slides about HyperDbg☆30Updated 10 months ago
- ☆76Updated last month
- ☆20Updated 5 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 3 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- A collection of various exploits☆27Updated 6 months ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Slides, recordings and materials of my public presentations, talks and workshops.☆75Updated this week
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 6 years ago
- frown (frida-own) – an instrumentation challenge☆24Updated last year
- A Linux x86/x86-64 tool to trace registers and memory regions.☆37Updated 2 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆26Updated 3 years ago
- ☆26Updated 3 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- Automatically exported from code.google.com/p/narly☆23Updated 3 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆14Updated 2 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆65Updated 11 months ago
- ☆19Updated last year
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆31Updated 4 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- ☆11Updated 5 months ago
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago