Exploiting the Semantic Gap in Trusted Execution Environments
☆56Nov 11, 2019Updated 6 years ago
Alternatives and similar repositories for boomerang
Users that are interested in boomerang are comparing it to the libraries listed below
Sorting:
- ☆11Jul 14, 2020Updated 5 years ago
- A collection for some scripts I used in CTF.☆15Apr 4, 2018Updated 7 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- Full TrustZone exploit for MSM8974☆142Jan 24, 2016Updated 10 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- IDA Pro Python plugin to analyze and annotate Linux kernel alternatives☆24Dec 15, 2021Updated 4 years ago
- A pip wrapper around AFL.☆87Apr 12, 2021Updated 4 years ago
- Some tools for CTF off line☆19Nov 19, 2017Updated 8 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- ☆26Nov 8, 2023Updated 2 years ago
- crashmon - A LLDB Based replacement for CrashWrangler☆47Nov 25, 2023Updated 2 years ago
- IDA (sort of) headless☆27Feb 17, 2024Updated 2 years ago
- Modifications in the qseecom driver which enable FuzzZone to operate☆24Dec 9, 2022Updated 3 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Feb 4, 2020Updated 6 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 11 years ago
- Game Hacking Adventures Scripts & Tools☆20Dec 29, 2012Updated 13 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- ☆67Jan 8, 2020Updated 6 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated 10 months ago
- ☆11Aug 10, 2021Updated 4 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Aug 11, 2019Updated 6 years ago
- ☆16May 9, 2016Updated 9 years ago
- Writeups from various CTFs solved with Mathematica☆10Apr 15, 2017Updated 8 years ago
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- Runtime Runtime-Oriented Programming (ROP) protection☆11Feb 17, 2019Updated 7 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 12 years ago
- Differential fault analysis framework for AES128☆51Jul 26, 2013Updated 12 years ago
- ☆53Jun 13, 2019Updated 6 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Aug 7, 2016Updated 9 years ago
- Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431☆362Jun 30, 2016Updated 9 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆77May 21, 2024Updated last year
- An emulator/debugger/disassembler I made for 8080☆16Nov 17, 2018Updated 7 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆15Apr 4, 2023Updated 2 years ago
- Windows builds for use with angr framework☆29Feb 12, 2016Updated 10 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago