vngkv123 / aSiagamingLinks
My Chrome and Safari exploit code + write-up repo
☆530Updated 3 years ago
Alternatives and similar repositories for aSiagaming
Users that are interested in aSiagaming are comparing it to the libraries listed below
Sorting:
- Collection of scripts and writeups☆325Updated 3 years ago
- Some CTF write up☆249Updated this week
- 💖CTF pwn framework.☆342Updated 3 years ago
- ☆224Updated 4 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆835Updated 5 years ago
- Write-ups from A*0*E.☆197Updated 5 years ago
- Script to setup pwn environment for CTF with Docker☆155Updated 3 years ago
- ☆283Updated 5 years ago
- An updated collection of resources targeting browser-exploitation.☆820Updated 4 years ago
- Some new commands debug heap for peda☆100Updated 4 months ago
- Linux Heap Exploitation Practice☆386Updated 6 years ago
- 🔍Heap analysis tool for CTF pwn.☆223Updated 4 years ago
- Web wrapper of niklasb/libc-database☆206Updated 9 months ago
- Corpus of public v8 vulnerability PoCs.☆217Updated 4 years ago
- Basic pwntools for Windows☆268Updated 2 years ago
- Some pwn challenges selected for training and education.☆385Updated 2 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆223Updated 4 years ago
- repository for kernel exploit practice☆407Updated 5 years ago
- CTF writeups from Balsn☆473Updated 3 years ago
- ☆385Updated last year
- Detect, analyze and uniquely identify crashes in Windows applications☆513Updated 3 months ago
- A Return-oriented Programming toolkit☆350Updated 8 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Updated 6 years ago
- Fuzzing Browsers☆312Updated 2 years ago
- The Harvest of V8 regress.☆137Updated 5 years ago
- A collection of 1days and solutions to challenges related to v8/chrome I developed☆158Updated 5 years ago
- ☆176Updated 6 years ago
- windows debug and exploit toolset for both user and kernel mode☆189Updated 2 months ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆757Updated 3 years ago
- A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer☆342Updated 6 years ago