Attacking the Core associated source files
☆89Dec 13, 2017Updated 8 years ago
Alternatives and similar repositories for atc-sources
Users that are interested in atc-sources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 5 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆305Jan 12, 2023Updated 3 years ago
- r2con 2017 September 6-9☆97Oct 23, 2017Updated 8 years ago
- A DBI tool to discover heap memory related bugs☆125Jun 25, 2018Updated 7 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Some kernel exploits☆146Nov 7, 2017Updated 8 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated last month
- ☆26Dec 8, 2025Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆147Jul 30, 2017Updated 8 years ago
- Some kernel fuzzing paper about windows and linux☆255Oct 9, 2017Updated 8 years ago
- VirtualBox 3D exploits & PoCs☆163Jan 24, 2019Updated 7 years ago
- Content from presentation at BHUSA 2017☆179Jul 27, 2017Updated 8 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- ☆121Apr 1, 2018Updated 7 years ago
- ☆17Oct 15, 2017Updated 8 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Any useful windbg plugins I've written.☆117Apr 10, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Linux Heap Exploitation Practice☆395Dec 1, 2018Updated 7 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- This repo has been migrated to https://github.com/github/security-lab/tree/master/SecurityExploits☆253Nov 5, 2019Updated 6 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆172Sep 27, 2017Updated 8 years ago
- Some tools☆10Dec 5, 2017Updated 8 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- DNS反弹shell客户端☆13Jul 24, 2016Updated 9 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 7 years ago
- Linux kernel exploitation experiments☆389Jan 19, 2026Updated 2 months ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆23May 31, 2017Updated 8 years ago
- ☆569May 30, 2018Updated 7 years ago
- ☆35Sep 18, 2015Updated 10 years ago
- Analysis of public exploits or my 1day exploits☆617Oct 1, 2020Updated 5 years ago
- A set of exploitation/reversing aids for IDA☆421Nov 28, 2017Updated 8 years ago