saelo / pwn2own2018
A Pwn2Own exploit chain
☆754Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for pwn2own2018
- Analysis of public exploits or my 1day exploits☆613Updated 4 years ago
- ☆524Updated 4 years ago
- A collection of vulnerable ARM binaries for practicing exploit development☆897Updated 2 years ago
- ☆456Updated 4 years ago
- Project Zero Docs and Tools☆706Updated 6 months ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆617Updated 4 years ago
- This repo records all the vulnerabilities of linux software I have reproduced in my local workspace☆399Updated last year
- A collection where my current and future writeups for exploits/CTF will go☆749Updated 3 years ago
- My Chrome and Safari exploit code + write-up repo☆528Updated 3 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 5 years ago
- A Javascript library for browser exploitation☆867Updated 5 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆636Updated 3 weeks ago
- Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities☆402Updated 3 years ago
- Linux Heap Exploitation Practice☆377Updated 5 years ago
- A tool to help you write binary exploits☆604Updated 5 years ago
- An archive of low-level CTF challenges developed over the years☆606Updated 2 years ago
- Interactive shellcoding environment to easily craft shellcodes☆891Updated 3 years ago
- Using Intel's PIN tool to solve CTF problems☆491Updated 4 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆220Updated 4 years ago
- ☆371Updated 4 years ago
- DOM fuzzer☆1,685Updated 2 months ago
- ☆606Updated last month
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆350Updated last year
- Cross Platform Kernel Fuzzer Framework☆445Updated 6 years ago
- Repo for FUZE project. I will also publish some Linux kernel LPE exploits for various real world kernel vulnerabilities here. the samples…☆491Updated 6 years ago
- Collection of scripts and writeups☆320Updated 2 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆737Updated 2 years ago
- jemalloc heap exploitation framework☆447Updated 2 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆446Updated 9 years ago