HITCON CTF 2018
☆46Oct 22, 2018Updated 7 years ago
Alternatives and similar repositories for windowsland
Users that are interested in windowsland are comparing it to the libraries listed below
Sorting:
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Nov 18, 2020Updated 5 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 8 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Jan 26, 2019Updated 7 years ago
- ☆17May 13, 2019Updated 6 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆91Feb 15, 2019Updated 7 years ago
- ☆153Jan 6, 2019Updated 7 years ago
- QEMU to drcov trace file☆11Nov 21, 2020Updated 5 years ago
- iOS/macOS: task_swap_mach_voucher() does not respect MIG semantics leading to use-after-free☆11Jan 30, 2019Updated 7 years ago
- ☆47Dec 29, 2018Updated 7 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Jul 20, 2019Updated 6 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- Fuzzilli For quickjs☆28Sep 16, 2019Updated 6 years ago
- ☆12Feb 20, 2021Updated 5 years ago
- Build docker container for @MaskRay's pcap-search☆10Aug 2, 2018Updated 7 years ago
- A framework provides an interface to monitor and control fuzzers☆30Jul 5, 2023Updated 2 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆215Jul 2, 2020Updated 5 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆91Feb 14, 2019Updated 7 years ago
- ☆100Nov 5, 2021Updated 4 years ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆89Sep 5, 2018Updated 7 years ago
- Fuzzing v8 with dharma and libfuzzer☆13Jan 28, 2020Updated 6 years ago
- ☆13Jul 31, 2020Updated 5 years ago
- repository for kernel exploit practice☆415Nov 12, 2019Updated 6 years ago
- ☆72Feb 1, 2024Updated 2 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- ☆41Jul 9, 2020Updated 5 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- A collection of 1days and solutions to challenges related to v8/chrome I developed☆162Oct 28, 2019Updated 6 years ago
- ☆89Dec 30, 2018Updated 7 years ago
- Making GO reversing easier in IDA Pro☆17Aug 8, 2019Updated 6 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- My Chrome and Safari exploit code + write-up repo☆532Nov 5, 2021Updated 4 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- Samsung Kernel Source from OSRC☆45Feb 2, 2020Updated 6 years ago
- V8 Tutorial PLDI 2019☆78Jul 23, 2019Updated 6 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- Proof of Concept of TrustZone exploit☆16Aug 10, 2025Updated 6 months ago
- ☆16Jun 25, 2018Updated 7 years ago
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago