vnik5287 / kernel_ropLinks
☆88Updated 9 years ago
Alternatives and similar repositories for kernel_rop
Users that are interested in kernel_rop are comparing it to the libraries listed below
Sorting:
- ☆140Updated 7 years ago
- VirtualBox 3D exploits & PoCs☆162Updated 6 years ago
- AFL, with scripts to support other architectures.☆96Updated 6 years ago
- Huawei mate 7 TrustZone exploit☆111Updated 9 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Updated 6 years ago
- ☆85Updated 5 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆92Updated 9 years ago
- A pip wrapper around AFL.☆86Updated 4 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆77Updated 5 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Updated 6 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Updated 8 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Updated 8 years ago
- Some kernel exploits☆144Updated 7 years ago
- slide and full exploit☆86Updated 4 years ago
- GDB plugin peda for arm☆146Updated last month
- Heap exploitation technique bypassing heap ASLR☆47Updated 5 years ago
- IDA cLEMENCy Tools☆62Updated 7 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆83Updated 8 years ago
- ☆82Updated 8 years ago
- riufuzz —— honggfuzz modifited version by riusksk, better support for windows (cdb symbols) and macOS, and more colorful UI☆131Updated 5 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 5 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆112Updated 7 years ago
- Another crash analyzer tool for the American Fuzzy Lop (AFL) fuzzer☆121Updated 8 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆187Updated 4 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Updated 5 years ago
- Solutions for my 34C3CTF challenges☆21Updated 7 years ago
- ☆38Updated 9 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆83Updated 7 years ago
- Peach Pit for HTTP/2 Targeting Microsoft Edge☆65Updated 8 years ago