Slides and demos
☆48Mar 24, 2015Updated 11 years ago
Alternatives and similar repositories for Talks
Users that are interested in Talks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool to resolve symbols by the address of the binary☆15Sep 21, 2018Updated 7 years ago
- The Chef symbolic execution platform, based off S2E☆12Nov 1, 2022Updated 3 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- a C/C++ shellcode compiler based on llvm/clang☆39Mar 29, 2016Updated 10 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Hacker News written in Python☆18Feb 22, 2016Updated 10 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- ☆11Apr 24, 2020Updated 6 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 9 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- PyQt plugin for Ida Pro for Screen recording.☆13Jul 27, 2016Updated 9 years ago
- ☆14Oct 5, 2019Updated 6 years ago
- Code repository for Blender for Designers, published by Packt☆12Jan 14, 2021Updated 5 years ago
- like ROP Defender☆10May 6, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Slides, codes and videos of the talk "DEP/ASLR bypass without ROP/JIT" on CanSecWest 2013☆48Mar 20, 2013Updated 13 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- Plugins for Scylla☆20Sep 14, 2011Updated 14 years ago
- Magellan PoC☆34Jan 23, 2019Updated 7 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆16Jul 6, 2014Updated 11 years ago
- Dynamic tracing for binary applications (using PIN), IDA plugin to visualize and interact with the traces☆97Mar 24, 2012Updated 14 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- ☆17Feb 29, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 极验验证码☆11Sep 20, 2018Updated 7 years ago
- ☆22Sep 6, 2018Updated 7 years ago
- ☆53Feb 27, 2017Updated 9 years ago
- ☆22Sep 26, 2023Updated 2 years ago
- This is a repo to implement Anomaly Detection which is the technique of identifying rare events or observations which can raise suspicion…☆22Jan 25, 2023Updated 3 years ago
- GUI Application in C# to run and disassemble shellcode☆36Aug 3, 2017Updated 8 years ago
- ☆19Mar 20, 2014Updated 12 years ago
- x64HOOK库☆18Jan 14, 2020Updated 6 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- 逆向小红伞杀毒软件驱动——avdevprot☆25Dec 3, 2017Updated 8 years ago
- Rapid generation ShellCode☆59Sep 12, 2017Updated 8 years ago
- ☆39Jul 11, 2016Updated 9 years ago
- Scanner for the SkeletonKey Malware☆30Jan 20, 2015Updated 11 years ago
- Python concolic execution framework for program analysis☆67Nov 13, 2014Updated 11 years ago
- HitCon 2015 spartan 0day & exploit☆27Sep 1, 2015Updated 10 years ago