ssd-secure-disclosure / advisories
SSD Secure Disclosure Advisories
☆168Updated 4 years ago
Alternatives and similar repositories for advisories:
Users that are interested in advisories are comparing it to the libraries listed below
- This is collaborative work of Ned Williamson and Niklas Baumstark☆131Updated 5 years ago
- ☆134Updated 5 years ago
- ☆88Updated 6 years ago
- VerSprite Security Research☆165Updated 2 years ago
- ☆100Updated 6 years ago
- macOS Kernel Fuzzer☆259Updated 7 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆139Updated 5 years ago
- Some new commands debug heap for peda☆98Updated 5 years ago
- A collection of 1days and solutions to challenges related to v8/chrome I developed☆156Updated 5 years ago
- Exploit for CVE-2019-9810 Firefox on Windows 64-bit.☆228Updated 5 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆119Updated 6 years ago
- September Chrome 1day by István Kurucsai☆81Updated 5 years ago
- Source code and exploits for some 35c3ctf challenges.☆138Updated 6 years ago
- My Chrome and Safari exploit code + write-up repo☆528Updated 3 years ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- ☆158Updated 5 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆89Updated 6 years ago
- The Harvest of V8 regress.☆136Updated 4 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆115Updated 6 years ago
- ☆381Updated last year
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆246Updated 5 years ago
- A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation☆230Updated 4 years ago
- Windows EoP Bugs☆127Updated 4 years ago
- ☆283Updated 4 years ago
- ☆106Updated 5 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆87Updated 6 years ago
- ☆197Updated 2 years ago
- Write-ups from A*0*E.☆197Updated 4 years ago
- A tool for checking exploitability☆209Updated 5 years ago
- This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.☆146Updated last year