Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for exploitation memory corruption
exploitation
x
memory-corruption
x
3 search results found
Hacksysextremevulnerabledriver
⭐
2,208
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
Armpwn
⭐
315
Repository to train/learn memory corruption on the ARM platform.
Vulnerable Kext
⭐
120
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Paracosme
⭐
82
Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stage during the Pwn2Own Miami 2022 competition.
0x88
⭐
24
0x88 exploit pack Decoded
Teerex Exploits
⭐
13
PoC exploits against various SGX enclaves
Related Searches
Python Exploitation (1,616)
Exploitation Cve (771)
Vulnerabilities Exploitation (636)
Exploitation Penetration Testing (353)
Exploitation Capture The Flag (226)
C Exploitation (109)
Assembly Exploitation (64)
Kernel Exploitation (60)
Driver Exploitation (47)
Exploitation Exploit Development (32)
1-3 of 3 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.