spookjs / spookjs-pocLinks
Proof-of-concept for Spook.js
☆70Updated 4 years ago
Alternatives and similar repositories for spookjs-poc
Users that are interested in spookjs-poc are comparing it to the libraries listed below
Sorting:
- No Sandbox - Applications That Run Chromium and Chrome Without The Sandbox. TL;DR exploits in these browser based applications are alread…☆187Updated 4 years ago
- Fork Free Fail Repeat☆48Updated 4 years ago
- Pickle decompiler plugin for Radare2☆18Updated 2 years ago
- GPU rootkit PoC by Team Jellyfish☆100Updated 10 years ago
- A binary hardening system☆110Updated 2 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- ☆48Updated 3 years ago
- SSD Challenges☆48Updated 3 years ago
- LKRG bypass methods☆73Updated 5 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆50Updated this week
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 6 months ago
- ☆16Updated 5 years ago
- ☆24Updated 4 years ago
- Simple rust fuzzer☆23Updated 4 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- ☆112Updated 2 years ago
- ELF launcher for encrypted binaries decrypted on-the-fly and executed in memory☆26Updated 5 years ago
- PageBuster - dump all executable pages of packed processes.☆204Updated 4 years ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆35Updated 4 years ago
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31Updated 3 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆70Updated 4 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 6 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆64Updated 2 years ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆67Updated 8 years ago
- ☆48Updated 5 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆28Updated 3 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago