stong / img2txtLinks
GPU-accelerated ascii art generator with subpixel rendering
☆18Updated 5 years ago
Alternatives and similar repositories for img2txt
Users that are interested in img2txt are comparing it to the libraries listed below
Sorting:
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆47Updated 5 years ago
- ☆48Updated 5 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆14Updated 5 years ago
- Plugin to embed Ghidra Decompiler into Binary Ninja☆97Updated 3 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- A plugin that adds a popup window to Binary Ninja that explains in simple English what an assembly instruction does☆52Updated 4 years ago
- LPE for CVE-2020-1054 targeting Windows 7 x64☆85Updated 5 years ago
- A library for patching ELFs☆60Updated 5 years ago
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆22Updated 3 years ago
- A fast execution trace symbolizer for Windows.☆129Updated last year
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆35Updated 4 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆123Updated 3 years ago
- ☆86Updated 2 years ago
- Multi-tool reverse engineering collaboration solution.☆143Updated last year
- A static analysis tool that helps security researchers scan a list of Windows kernel drivers for common vulnerability patterns in drivers…☆71Updated 4 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- ☆80Updated 10 months ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- ☆90Updated 5 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆33Updated 2 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆125Updated 4 years ago
- This utility allows you to lock every available memory regions of an arbitrary process into its working set.☆69Updated 2 years ago
- Helper idapython code for reversing kmdf drivers☆74Updated 3 years ago
- ☆135Updated 6 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆144Updated 4 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104Updated 5 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated 2 years ago