roddux / fuzref
Reference material for fuzzing and creating fuzzers
☆17Updated 5 years ago
Related projects: ⓘ
- Capture The Flag Binary fuzzer for Heap challanges☆38Updated 6 years ago
- #INFILTRATE20 raptor's party pack.☆28Updated 8 months ago
- Tools for instrumenting Windows Defender's mpengine.dll☆36Updated 5 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆20Updated 4 years ago
- My conference presentations and Materials for them.☆32Updated 2 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 3 years ago
- winafl with mopt mutators and afl fast power schedulers.☆20Updated 2 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 4 years ago
- 3D Accelerated Exploitation☆54Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated 8 months ago
- The Dumb Network Fuzzer☆20Updated last year
- ☆37Updated 5 years ago
- python and honggfuzz☆25Updated 4 years ago
- ☆71Updated 2 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆62Updated last year
- My public presentations☆39Updated last year
- ☆82Updated 10 months ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆22Updated 7 months ago
- Dockerfiles for (un)popular fuzzers!☆28Updated 4 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- An automated setup for compiling & fuzzing Apache httpd server☆47Updated last year
- A Fuzzer for Windows NDIS Drivers OID Handlers☆91Updated 2 years ago
- ☆22Updated 5 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆48Updated 4 years ago
- ☆45Updated this week
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 8 years ago
- A repository for my conference presentations☆35Updated 4 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆58Updated last year
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- New improved corpus distillation toolset that has helped to found tens of vulnerabilities in MS and Adobe products☆52Updated 4 years ago