spookjs / spookjs-pocLinks
Proof-of-concept for Spook.js
☆70Updated 4 years ago
Alternatives and similar repositories for spookjs-poc
Users that are interested in spookjs-poc are comparing it to the libraries listed below
Sorting:
- SSD Challenges☆48Updated 3 years ago
- ☆24Updated 4 years ago
- GPU rootkit PoC by Team Jellyfish☆100Updated 10 years ago
- ☆48Updated 2 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆50Updated 3 years ago
- 1day research effort☆18Updated 4 years ago
- Pickle decompiler plugin for Radare2☆18Updated 2 years ago
- A binary hardening system☆109Updated 2 years ago
- Simple rust fuzzer☆23Updated 4 years ago
- LKRG bypass methods☆73Updated 5 years ago
- No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are alread…☆187Updated 4 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- ☆13Updated 5 years ago
- Fork Free Fail Repeat☆49Updated 4 years ago
- Alcatraz project for Black Hat USA 2021☆78Updated 4 years ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.☆226Updated 4 years ago
- ☆100Updated 3 years ago
- ☆20Updated 3 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆63Updated 2 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆28Updated 3 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆96Updated 4 months ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆144Updated 4 years ago
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31Updated 3 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- Configure SPI flash write protection.☆24Updated 5 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆69Updated 4 years ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆66Updated 8 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆72Updated 4 years ago