Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge
☆38Dec 30, 2016Updated 9 years ago
Alternatives and similar repositories for feuerfuchs
Users that are interested in feuerfuchs are comparing it to the libraries listed below
Sorting:
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- Exploit code for CVE-2016-9066☆45Mar 19, 2017Updated 8 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- ☆12Mar 28, 2022Updated 3 years ago
- PoC exploit for CVE-2016-4622☆109Sep 18, 2023Updated 2 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf☆60Apr 25, 2019Updated 6 years ago
- ☆28Jan 27, 2017Updated 9 years ago
- ☆47Dec 29, 2018Updated 7 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆36Dec 31, 2016Updated 9 years ago
- ☆51Mar 23, 2018Updated 7 years ago
- Microsoft Edge MemGC Internals☆17Sep 2, 2015Updated 10 years ago
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 8 years ago
- ☆17May 13, 2019Updated 6 years ago
- Some kernel exploits☆146Nov 7, 2017Updated 8 years ago
- ☆81Jun 12, 2017Updated 8 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Jan 26, 2019Updated 7 years ago
- My Chrome and Safari exploit code + write-up repo☆532Nov 5, 2021Updated 4 years ago
- A IDAPython script for searching overflows by IDA.☆21Sep 21, 2017Updated 8 years ago
- PEDA-like debugger UI for WinDbg☆206Mar 29, 2024Updated last year
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Mar 13, 2016Updated 9 years ago
- ☆28Feb 6, 2024Updated 2 years ago
- Webkit JavascriptCore Array unshift function had a race condition, it leads to RCE.☆44Dec 5, 2023Updated 2 years ago
- Source code and exploits for some 35c3ctf challenges.☆143Dec 30, 2018Updated 7 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- A collection of curated resources and CVEs I use for research.☆107Aug 8, 2021Updated 4 years ago
- ☆28Aug 19, 2019Updated 6 years ago
- This framework is for fuzzing OSX kernel vulnerability based on passive inline hook mechanism in kernel mode.☆229Oct 18, 2017Updated 8 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Jul 18, 2015Updated 10 years ago
- A collection of various exploits☆28Sep 17, 2024Updated last year
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Mar 23, 2016Updated 9 years ago
- my public code☆167Jan 11, 2017Updated 9 years ago
- ☆280May 21, 2020Updated 5 years ago
- Scripts for Binary Ninja☆258Apr 11, 2023Updated 2 years ago
- ☆24Dec 6, 2015Updated 10 years ago
- ☆13Apr 17, 2018Updated 7 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago