☆20Oct 15, 2024Updated last year
Alternatives and similar repositories for Counterfeit_Object_Oriented_Programming_COOP
Users that are interested in Counterfeit_Object_Oriented_Programming_COOP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Oct 17, 2024Updated last year
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆30Jun 7, 2025Updated 10 months ago
- ☆46Oct 10, 2025Updated 6 months ago
- Load a dynamic library from memory using a fuse mount☆32Sep 15, 2023Updated 2 years ago
- A collection of various exploits☆29Sep 17, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- A framework provides an interface to monitor and control fuzzers☆30Jul 5, 2023Updated 2 years ago
- ☆13Mar 24, 2026Updated last month
- Just another .data pointer hook. This time it's hooking AfdIrpCallDispatch within Afd.sys☆12Feb 22, 2022Updated 4 years ago
- Weaponized VSCode Extensions☆17Updated this week
- Driver Buddy Revolutions for Ghidra☆46Mar 28, 2026Updated last month
- A console tool for inspecting Windows Ancillary Function Driver sockets☆21May 15, 2025Updated 11 months ago
- ☆13Dec 29, 2022Updated 3 years ago
- ☆13Apr 13, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- New exploitation tricks for hardened .NET Remoting servers☆32Aug 5, 2025Updated 8 months ago
- ☆65Aug 15, 2023Updated 2 years ago
- VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advan…☆24Mar 16, 2025Updated last year
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Target components for kAFL/Nyx Fuzzer☆34Jul 21, 2025Updated 9 months ago
- ☆131May 15, 2025Updated 11 months ago
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- Collections of student projects to find execution path in binary program via taint analysis using Ghidra☆18Sep 25, 2022Updated 3 years ago
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆19Mar 7, 2026Updated last month
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆18Jun 9, 2023Updated 2 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- A PoC tool for exploiting leaked process and thread handles☆34Feb 13, 2024Updated 2 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆107Feb 12, 2025Updated last year
- iot安全题目学习记录☆17Dec 13, 2021Updated 4 years ago
- How to get a linux kernel debug environment☆31Apr 7, 2018Updated 8 years ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 11 months ago
- IDA Pro Python plugin to analyze and annotate Linux kernel alternatives☆23Dec 15, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Custom Binary Ninja Themes☆12Nov 11, 2023Updated 2 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Nov 18, 2020Updated 5 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆49Jan 6, 2017Updated 9 years ago
- EvtPsst☆55Oct 24, 2023Updated 2 years ago
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- SIPP(Statistically sound Inner Pairing Product) verification in SNARK☆17Oct 8, 2023Updated 2 years ago