Course materials for Modern Binary Exploitation by RPISEC
-
Updated
Dec 9, 2021 - C
Course materials for Modern Binary Exploitation by RPISEC
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
UNIX-like reverse engineering framework and command-line toolset.
Linux Binary Exploitation
mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/
A set of tutorials about code injection for Windows.
Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC
台大 計算機安全 - Pwn 簡報、影片、作業題目與解法 - Computer Security Fall 2019 @ CSIE NTU Taiwan
Feature-rich Post Exploitation Framework with Network Pivoting capabilities.
Scripts, plugins, and information for working with Samsung's Shannon baseband.
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Kernel exploits for the Oculus Quest
A general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good performance
Reverse Engineering tools
NTPD remote DOS exploit and vulnerable container
This repository contains the tools we used in our research on the Google Titan M chip
Binary Exploitation and Reverse-Engineering (from assembly into C)
Security Evaluation of Dynamic Binary Instrumentation Engines
Add a description, image, and links to the exploitation topic page so that developers can more easily learn about it.
To associate your repository with the exploitation topic, visit your repo's landing page and select "manage topics."