vnik5287 / kaslr_tsx_bypassLinks
Linux kASLR (Intel TSX/RTM) bypass static library
☆77Updated 8 years ago
Alternatives and similar repositories for kaslr_tsx_bypass
Users that are interested in kaslr_tsx_bypass are comparing it to the libraries listed below
Sorting:
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆104Updated 9 years ago
- ☆91Updated 9 years ago
- ☆40Updated 8 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 6 years ago
- Example of manipulating Firefox's jemalloc-managed heap☆29Updated 12 years ago
- ☆81Updated 8 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆23Updated 8 years ago
- PoC for CVE-2015-6086☆67Updated 9 years ago
- specific fuzzers based on AFL and fuzzing results☆41Updated 9 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 9 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Updated 9 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Updated 9 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Updated 9 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 12 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 8 years ago
- Materials from Fuzzing Bay Area meetups☆68Updated 6 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- run AFL with pintool☆66Updated 5 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Updated 6 years ago
- Solutions for my 34C3CTF challenges☆21Updated 7 years ago
- ☆28Updated 2 years ago
- Automated Return-Oriented Programming Chaining☆85Updated 9 years ago
- Exploits for interesting CTF challenges I have worked on☆63Updated 8 years ago
- ☆49Updated 7 years ago
- Code samples used for the blog post☆24Updated 9 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 6 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆119Updated 7 years ago
- ☆28Updated 3 years ago