spookjs / spookjs-pocLinks
Proof-of-concept for Spook.js
☆70Updated 3 years ago
Alternatives and similar repositories for spookjs-poc
Users that are interested in spookjs-poc are comparing it to the libraries listed below
Sorting:
- A binary hardening system☆109Updated last year
- ☆24Updated 4 years ago
- LKRG bypass methods☆72Updated 5 years ago
- Fork Free Fail Repeat☆49Updated 3 years ago
- GPU rootkit PoC by Team Jellyfish☆99Updated 10 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are alread…☆186Updated 4 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆49Updated 3 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆62Updated 2 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- ☆13Updated 5 years ago
- SSD Challenges☆47Updated 2 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆139Updated 4 years ago
- ☆48Updated 2 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated 2 months ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆65Updated 8 years ago
- Artifact Repository for the paper "Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses"☆40Updated 3 years ago
- PageBuster - dump all executable pages of packed processes.☆203Updated 4 years ago
- ☆112Updated 2 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- ☆49Updated 4 years ago
- Pickle decompiler plugin for Radare2☆18Updated 2 years ago
- Automatic ROPChain Generation☆291Updated 5 years ago
- Artifacts to the ALPACA attack.☆60Updated 3 years ago
- PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.☆225Updated 4 years ago
- ☆100Updated 3 years ago
- Binary Golf Library☆61Updated 4 years ago
- Configure SPI flash write protection.☆24Updated 5 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆71Updated 8 years ago
- tools for shellcoding☆56Updated 2 years ago