struct / research
A repo for various research
☆102Updated 2 years ago
Alternatives and similar repositories for research:
Users that are interested in research are comparing it to the libraries listed below
- PoC for CVE-2015-6086☆68Updated 8 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆68Updated 7 years ago
- GATEKEEPER: Inline and on-target defense☆119Updated 2 years ago
- Collection of software bugs found by SkyLined☆68Updated 8 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- Library for creating CTF services.☆74Updated 8 years ago
- ☆49Updated 7 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 9 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 9 years ago
- r2con 2017 September 6-9☆97Updated 7 years ago
- Small tool for generating ropchains using unicorn and z3☆197Updated 7 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆55Updated 9 years ago
- Some example source code for fixed IE11 sandbox escapes.☆140Updated 10 years ago
- A program to draw rectangles from heap traces.☆132Updated 5 years ago
- POLAR☆73Updated 6 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 8 years ago
- A little tool to execute functions without debugging an entire executable. Originally written by Gonzalo J. Carracedo (BatchDrake).☆29Updated 10 years ago
- Repo for CSAW CTF 2018 Quals challenges☆44Updated 7 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 7 years ago
- Xenpwn is a toolkit for memory access tracing using hardware-assisted virtualization☆144Updated 8 years ago
- ☆25Updated 9 years ago
- SHURIKEN: Exploit throwing framework☆36Updated 9 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- Some slides from some presentations I have given☆25Updated 9 years ago
- Helper script for working with format string bugs☆57Updated 4 years ago
- ☆72Updated 6 years ago