tombkeeper / DEP-and-ASLR-bypass-without-ROP-or-JIT
Slides, codes and videos of the talk "DEP/ASLR bypass without ROP/JIT" on CanSecWest 2013
☆49Updated 12 years ago
Alternatives and similar repositories for DEP-and-ASLR-bypass-without-ROP-or-JIT:
Users that are interested in DEP-and-ASLR-bypass-without-ROP-or-JIT are comparing it to the libraries listed below
- A Browser Fuzzer for Vulnerbilities☆65Updated 10 years ago
- A static Internet Explorer Fuzzer.☆50Updated 7 years ago
- HitCon 2015 spartan 0day & exploit☆27Updated 9 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Updated 10 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆72Updated 8 years ago
- ☆92Updated 10 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- fuzz☆125Updated 9 years ago
- ☆51Updated 8 years ago
- ☆19Updated 11 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆97Updated 12 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Updated 11 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 5 years ago
- Some kernel exploit i wrote☆77Updated 10 years ago
- ☆34Updated 7 years ago
- Collection of software bugs found by SkyLined☆68Updated 8 years ago
- cve-2014-4323 poc☆24Updated 9 years ago
- Binfuzz.js: A Binary Fuzzer in JavaScript☆30Updated 11 years ago
- PEDA - Python Exploit Development Assistance for GDB☆19Updated 7 years ago
- plugin of ida with pin☆48Updated 4 years ago
- windows kernel vulnerability found by me☆90Updated 7 years ago
- ☆34Updated 9 years ago
- ☆31Updated 7 years ago
- Using SEH to bypass CFG☆29Updated 8 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆86Updated 8 years ago
- PoC for CVE-2015-6086☆68Updated 9 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆91Updated 11 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- Resources for reverse engineering Go binaries☆41Updated 10 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 8 years ago