solar-wine / writeups
Hack-A-Sat Qualifiers Writeups
☆234Updated last year
Related projects ⓘ
Alternatives and complementary repositories for writeups
- ASLR bypass without infoleak☆152Updated 3 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆140Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆105Updated 7 months ago
- ☆123Updated last year
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆208Updated 10 months ago
- An automatic Blind ROP exploitation tool☆189Updated last year
- ☆199Updated 2 weeks ago
- ☆306Updated 4 months ago
- Hack-a-Sat 4 2023 - Finals Public Release☆36Updated last year
- list of organizations offering vulnerability research/reverse engineering jobs☆59Updated 3 months ago
- RE / Binary Exploitation Resources☆67Updated 6 years ago
- All Files, Scripts, and exploits can be found here☆59Updated 3 years ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆174Updated last year
- CTFs and solutions for Linux binary exploitation.☆108Updated 5 months ago
- ☆42Updated 2 years ago
- Hands-on workshop on the basics of hardware hacking.☆114Updated last year
- Bluetooth Security Assessment Methodology☆110Updated 5 months ago
- A tool for firmware cartography☆139Updated 8 months ago
- ☆157Updated 2 years ago
- Write fuzzer with rust☆193Updated last year
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆230Updated this week
- Comprehensive toolkit for Ghidra headless.☆349Updated last year
- Application Fuzzing: Tools, Techniques, and Best Practices☆150Updated last month
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆161Updated 7 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆78Updated 8 months ago
- Leveraging patch diffing to discover new vulnerabilities☆108Updated 2 weeks ago
- esoteric☆50Updated 4 years ago
- A series of writes about “Binary Exploitation”.☆87Updated last year
- ☆66Updated 6 months ago