vngkv123 / aSiagaming
My Chrome and Safari exploit code + write-up repo
☆528Updated 3 years ago
Alternatives and similar repositories for aSiagaming
Users that are interested in aSiagaming are comparing it to the libraries listed below
Sorting:
- Collection of scripts and writeups☆322Updated 3 years ago
- Some CTF write up☆246Updated 3 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆819Updated 4 years ago
- ☆223Updated 4 years ago
- ☆283Updated 5 years ago
- 💖CTF pwn framework.☆344Updated 3 years ago
- Linux Heap Exploitation Practice☆383Updated 6 years ago
- An updated collection of resources targeting browser-exploitation.☆817Updated 4 years ago
- Corpus of public v8 vulnerability PoCs.☆212Updated 3 years ago
- Script to setup pwn environment for CTF with Docker☆154Updated 3 years ago
- Web wrapper of niklasb/libc-database☆203Updated 5 months ago
- Some new commands debug heap for peda☆99Updated last month
- Detect, analyze and uniquely identify crashes in Windows applications☆505Updated 2 months ago
- Some pwn challenges selected for training and education.☆384Updated last year
- 🔍Heap analysis tool for CTF pwn.☆223Updated 4 years ago
- Using Intel's PIN tool to solve CTF problems☆499Updated 5 years ago
- Write-ups from A*0*E.☆198Updated 5 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆223Updated 4 years ago
- ☆383Updated last year
- repository for kernel exploit practice☆395Updated 5 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆749Updated 2 years ago
- Basic pwntools for Windows☆262Updated 2 years ago
- A Return-oriented Programming toolkit☆350Updated 8 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing.☆572Updated 4 years ago
- Fuzzing Browsers☆311Updated 2 years ago
- Exploit for CVE-2019-9810 Firefox on Windows 64-bit.☆229Updated 5 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆386Updated 2 years ago
- windows debug and exploit toolset for both user and kernel mode☆184Updated 8 months ago
- The Harvest of V8 regress.☆137Updated 4 years ago
- For Linux binary Exploitation☆831Updated 7 years ago