radareorg / r2con2021
☆28Updated 3 years ago
Alternatives and similar repositories for r2con2021:
Users that are interested in r2con2021 are comparing it to the libraries listed below
- The Dumb Network Fuzzer☆19Updated last year
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆64Updated 10 months ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆14Updated 2 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- Slides about HyperDbg☆30Updated 8 months ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆75Updated 4 months ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- ☆74Updated 2 years ago
- ☆12Updated 3 years ago
- ☆23Updated 3 weeks ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- ☆30Updated 2 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆34Updated 2 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- Extract data of TTD trace file to a minidump☆28Updated last year
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 2 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆48Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- ☆20Updated 5 years ago
- weggli ruleset scanner for source code and binaries☆24Updated last month
- Import DynamoRIO drcov code coverage data into Ghidra☆42Updated last year
- ☆14Updated 3 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 3 years ago
- A collection of various exploits☆25Updated 5 months ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 2 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆25Updated 3 years ago
- ☆14Updated 6 years ago