vnik5287 / kaslr_tsx_bypassView external linksLinks
Linux kASLR (Intel TSX/RTM) bypass static library
☆77Oct 15, 2017Updated 8 years ago
Alternatives and similar repositories for kaslr_tsx_bypass
Users that are interested in kaslr_tsx_bypass are comparing it to the libraries listed below
Sorting:
- ☆91Jul 31, 2019Updated 6 years ago
- ☆91Jun 23, 2016Updated 9 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 6 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Dec 31, 2018Updated 7 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆114Mar 5, 2018Updated 7 years ago
- The project black zone☆18Nov 9, 2017Updated 8 years ago
- Some kernel exploits☆146Nov 7, 2017Updated 8 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆82Sep 1, 2018Updated 7 years ago
- macOS Kernel Fuzzer☆259Oct 23, 2017Updated 8 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Nov 19, 2017Updated 8 years ago
- A set of exploitation/reversing aids for IDA☆422Nov 28, 2017Updated 8 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Jun 14, 2017Updated 8 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆171Dec 7, 2016Updated 9 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap☆168May 10, 2018Updated 7 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆57Dec 23, 2017Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆301Jan 12, 2023Updated 3 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- Symbol REPL☆31Mar 4, 2018Updated 7 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Aug 15, 2017Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- Automatically generate ASM.JS JIT-Spray payloads☆36Mar 14, 2018Updated 7 years ago
- add symbols back into a stripped ELF binary (~strip)☆177Aug 8, 2017Updated 8 years ago
- ☆19Mar 24, 2017Updated 8 years ago
- ☆40Dec 29, 2017Updated 8 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Apr 9, 2018Updated 7 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆590Jan 10, 2019Updated 7 years ago
- ☆190Oct 25, 2017Updated 8 years ago
- A code gadget finder based on capstone/keystone/pyelftools☆92Mar 9, 2017Updated 8 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- Fuzzer for Linux Kernel Drivers☆384Apr 30, 2022Updated 3 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Apr 6, 2017Updated 8 years ago
- Solutions for my 34C3CTF challenges☆21Jul 9, 2018Updated 7 years ago
- Array.prototype.slice wrong alias information.☆68Mar 25, 2019Updated 6 years ago
- X41 Browser Security White Paper - Tools and PoCs☆183Sep 29, 2017Updated 8 years ago
- ☆22Apr 12, 2019Updated 6 years ago
- ☆32Nov 15, 2017Updated 8 years ago