vusec / smashLinks
☆48Updated 2 years ago
Alternatives and similar repositories for smash
Users that are interested in smash are comparing it to the libraries listed below
Sorting:
- Working Set Page Cache side-channel IPC PoC☆68Updated 6 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆28Updated 3 years ago
- A tool to perform so called BGE attack☆25Updated 2 months ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆42Updated 4 years ago
- ☆86Updated last year
- Proof-of-concept code for the SMoTherSpectre exploit.☆75Updated 5 years ago
- Alphanumeric+1 shellcoding tools for RISC-V☆37Updated 6 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Updated 5 years ago
- ☆74Updated last year
- ☆37Updated 2 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Repo for storing CTF related stuff (Writeups, etc.)☆52Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 8 months ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆35Updated 4 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago
- A library for patching ELFs☆57Updated 4 years ago
- Meltdown/Spectre PoC for Windows☆25Updated 6 years ago
- ☆16Updated last year
- ☆11Updated 3 years ago
- Automatically exported from code.google.com/p/narly☆24Updated 4 years ago
- Python interface for Binexport, the Bindiff export format☆17Updated 2 weeks ago
- Some exploits I have written to showcase and to share☆53Updated 4 years ago
- ☆20Updated 3 years ago
- Alcatraz project for Black Hat USA 2021☆78Updated 4 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- ☆48Updated 5 years ago