snorez / exploitsLinks
practice
☆67Updated 5 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- Source code for building an exploitable linux kernel challenge iso.☆46Updated 11 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- ☆68Updated last year
- A code-searching/completion tool, for IDA APIs☆83Updated 6 months ago
- ☆31Updated 5 years ago
- Worst Android kernel fuzzer☆46Updated 4 years ago
- ☆61Updated 6 months ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Updated 4 years ago
- My Material for the HITB presentation☆35Updated 5 years ago
- PoCs for VMWare VGPU Direct 3D 10 vulnerabilities fixed in VMware Workstation 12.5.5 and 12.5.7☆36Updated 8 years ago
- ☆36Updated 6 years ago
- TyphoonCon 2019☆52Updated 5 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆60Updated 2 years ago
- ☆30Updated 6 years ago
- ☆31Updated 3 months ago
- Some exploits I have written to showcase and to share☆53Updated 4 years ago
- ☆37Updated 6 years ago
- The slides from my Saintcon 2019 talk.☆48Updated 5 years ago
- 2019 Advent Calendar, vmware pwnables☆50Updated 5 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆71Updated 8 years ago
- HITCON CTF 2018☆45Updated 6 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- adobe afdko fuzz☆41Updated 5 years ago
- Library to wrap all file calls when fuzzing with AFL++☆50Updated 2 years ago
- ☆85Updated last year
- ☆99Updated 6 years ago
- A function tracer☆90Updated 6 years ago
- exploit development☆49Updated 7 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆88Updated 6 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago