sslab-gatech / pwn2own2020Links
Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities
☆411Updated 4 years ago
Alternatives and similar repositories for pwn2own2020
Users that are interested in pwn2own2020 are comparing it to the libraries listed below
Sorting:
- Project Zero Docs and Tools☆811Updated 3 months ago
- A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation☆232Updated 5 years ago
- ☆444Updated last year
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆224Updated 5 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆389Updated 3 years ago
- ☆523Updated 5 years ago
- A Pwn2Own exploit chain☆756Updated 7 years ago
- repository for kernel exploit practice☆414Updated 6 years ago
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆335Updated 5 years ago
- Here is some resources about macOS/iOS system security.☆536Updated 10 months ago
- SSD Secure Disclosure Advisories☆170Updated 5 years ago
- My Chrome and Safari exploit code + write-up repo☆531Updated 4 years ago
- Slide decks from my conference presentations☆367Updated 2 years ago
- macOS Kernel Fuzzer☆259Updated 8 years ago
- Source code and exploits for some 35c3ctf challenges.☆143Updated 7 years ago
- ☆463Updated 5 years ago
- A thorough library database to assist with binary exploitation tasks.☆194Updated 3 years ago
- Analysis of public exploits or my 1day exploits☆617Updated 5 years ago
- macOS Kernel Exploit for CVE-2019-8781.☆293Updated 6 years ago
- ☆111Updated 6 years ago
- An updated collection of resources targeting browser-exploitation.☆824Updated 4 years ago
- Fuzzing harness for testing proprietary image codecs supported by Skia on Android☆353Updated 5 years ago
- Useful tips by OTA CTF members☆149Updated 6 years ago
- A happy heap editor to support your exploitation process☆198Updated 4 years ago
- Reversing the Apple sandbox☆246Updated 8 months ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆424Updated 3 years ago
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆306Updated last year
- ☆159Updated 6 years ago
- Linux Heap Exploitation Practice☆395Updated 7 years ago
- A Binary Ninja plugin for vulnerability research.☆298Updated last year