samuraictf / shuriken-frameworkView external linksLinks
SHURIKEN: Exploit throwing framework
☆36Dec 8, 2015Updated 10 years ago
Alternatives and similar repositories for shuriken-framework
Users that are interested in shuriken-framework are comparing it to the libraries listed below
Sorting:
- GATEKEEPER: Inline and on-target defense☆121Sep 1, 2022Updated 3 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- My CTF writeup☆26Mar 20, 2017Updated 8 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- WTF are those magic numbers?!!☆33Dec 20, 2021Updated 4 years ago
- jeap, exploit 10 in 0ctf 2016 quals☆15Mar 14, 2016Updated 9 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 8 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- Repo for CSAW CTF 2016 Quals challenges☆74Sep 18, 2016Updated 9 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- ☆17May 13, 2019Updated 6 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- Use Dispatch to add AFL-compatible instrumentation to your binaries☆12Dec 30, 2016Updated 9 years ago
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- my public code☆167Jan 11, 2017Updated 9 years ago
- A simple test of fuzzing Java with AFL and GCJ☆16Jan 31, 2018Updated 8 years ago
- Fuzzing compression libraries☆20Jan 10, 2016Updated 10 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- PoCs/Examples for my guest post on doar-e☆19Nov 27, 2014Updated 11 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- ☆280May 21, 2020Updated 5 years ago
- ☆64Oct 24, 2015Updated 10 years ago
- defcon framework by SeoulPlusBadass☆18Dec 11, 2022Updated 3 years ago
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Mar 23, 2016Updated 9 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- bash web server because reasons -- CSAW 2016 Prelims☆18Aug 28, 2016Updated 9 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆37Nov 16, 2015Updated 10 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago