vusec / smashLinks
☆48Updated 3 years ago
Alternatives and similar repositories for smash
Users that are interested in smash are comparing it to the libraries listed below
Sorting:
- Browser exploitation v8 and sandbox escape challenges with solutions.☆28Updated 3 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆35Updated 4 years ago
- Working Set Page Cache side-channel IPC PoC☆68Updated 6 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆33Updated 5 years ago
- A tool to perform so called BGE attack☆25Updated 5 months ago
- ☆86Updated 2 years ago
- ☆48Updated 5 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 11 months ago
- A MBR Fuzzer☆30Updated last year
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆42Updated 4 years ago
- Proof-of-concept code for the SMoTherSpectre exploit.☆75Updated 6 years ago
- ☆37Updated 4 years ago
- Alphanumeric+1 shellcoding tools for RISC-V☆37Updated 6 years ago
- TrustZone Trusted Application 0-Days by Design☆24Updated 6 months ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42Updated 2 years ago
- ☆75Updated last year
- Python interface for Binexport, the Bindiff export format☆17Updated 3 weeks ago
- The public release of LeftoverLocals code☆70Updated last year
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Updated 5 years ago
- Slides about HyperDbg☆40Updated 4 months ago
- A library for patching ELFs☆57Updated 4 years ago
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆23Updated 6 years ago
- ☆33Updated 9 months ago
- Spectre based on Linear Address Masking☆67Updated last year
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆52Updated 5 months ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 3 years ago
- Configure SPI flash write protection.☆24Updated 5 years ago