zhuowei / worthdoingbadly.comView external linksLinks
My blog where I make a new coding project every Thursday.
☆46Dec 2, 2025Updated 2 months ago
Alternatives and similar repositories for worthdoingbadly.com
Users that are interested in worthdoingbadly.com are comparing it to the libraries listed below
Sorting:
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- ☆14Oct 5, 2019Updated 6 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Security Research☆36Dec 23, 2021Updated 4 years ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- Mirror of http://sourceforge.net/p/safeclib/code/ci/master/tree/☆15Apr 6, 2015Updated 10 years ago
- ☆19Mar 20, 2014Updated 11 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- ☆16Jul 7, 2020Updated 5 years ago
- interesting analysis☆16May 14, 2018Updated 7 years ago
- Rust library for encoding/decoding Windows cabinet (.cab) files☆21Jul 16, 2025Updated 6 months ago
- Simple poc of CVE-2018-8414 Windows Package Setting RCE Vulnerability☆22Sep 21, 2020Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- You don't need to be as fast as lightspeed, but a run on a treadm1ll surely doesn't hurt.☆53Jan 23, 2020Updated 6 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- ☆41Jan 12, 2017Updated 9 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- Simple rust fuzzer☆23Mar 17, 2021Updated 4 years ago
- Control Flow Guard Teleportation demo☆23Jul 28, 2019Updated 6 years ago
- Misc PoCs for various research topics☆21Sep 28, 2022Updated 3 years ago
- Extract annoations from Ghidra into an X32/X64 dbg database☆57Feb 24, 2021Updated 4 years ago
- CVE-2013-6282 proof of concept for Android☆21Dec 19, 2016Updated 9 years ago
- a toy to play with siguza's very first 0 day - sandbox escape☆19Dec 10, 2020Updated 5 years ago
- Plugin for Frida in Binary Ninja☆27May 19, 2021Updated 4 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Jul 20, 2019Updated 6 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Nov 30, 2018Updated 7 years ago
- checkm8 for haywire☆53Dec 27, 2019Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Aug 18, 2019Updated 6 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- Attacking the Core associated source files☆89Dec 13, 2017Updated 8 years ago
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Jul 1, 2017Updated 8 years ago
- Toshiba MeP-c4 for Ghidra☆22May 29, 2019Updated 6 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- A PyQt5 frontend to the binjatron plugin for Binary Ninja that includes highlighting features aimed at making it easier for beginners to …☆24Aug 22, 2017Updated 8 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- ☆21Dec 23, 2019Updated 6 years ago
- Valgrind extension for whitebox fuzz testing☆30Jul 10, 2009Updated 16 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Aug 6, 2023Updated 2 years ago