| nagwww/s3-leaks |
330 |
|
0 |
0 |
over 2 years ago |
0 |
|
1 |
|
|
| List of S3 Hacks |
| bcoles/kasld |
324 |
|
0 |
0 |
about 2 years ago |
0 |
|
0 |
mit |
C |
| Kernel Address Space Layout Derandomization [ KASLD ] - A collection of various techniques to infer the Linux kernel base virtual address as an unprivileged local user, for the purpose of bypassing Kernel Address Space Layout Randomization (KASLR). |
| hhlxf/USO_Info_Leak |
56 |
|
0 |
0 |
over 5 years ago |
0 |
|
0 |
|
C++ |
| two heap address leak bugs in `usosvc` service |
| Fraunhofer-AISEC/DATA |
37 |
|
0 |
0 |
almost 3 years ago |
0 |
|
9 |
gpl-3.0 |
Python |
| Differential Address Trace Analysis |
| tencentbladeteam/Exploit-Amazon-Echo |
31 |
|
0 |
0 |
over 7 years ago |
0 |
|
0 |
|
Python |
| Shellcode, reports of Amazon Echo, which we have presented on Defcon26 |
| nabijaczleweli/openalias.rs |
15 |
|
0 |
0 |
over 7 years ago |
0 |
|
0 |
mit |
Rust |
| Look up and parse OpenAlias data |
| geoffviola/undefined_behavior_study |
9 |
|
0 |
0 |
over 3 years ago |
0 |
|
0 |
apache-2.0 |
Python |
| A study of undefined behavior on various platforms, compilers, and tools |
| andreafioraldi/leakyleak |
8 |
|
0 |
0 |
about 7 years ago |
0 |
|
0 |
mit |
Python |
| a POC for the libc address leak using __libc_csu_init from the paper https://i.blackhat.com/briefings/asia/2018/asia-18-Marco-return-to-csu-a-new-method-to-bypass-the-64-bit-Linux-ASLR-wp.pdf |
| yuawn/my-ctf-design |
8 |
|
0 |
0 |
over 8 years ago |
0 |
|
0 |
|
C |
| My CTF designs. |
| guyinatuxedo/The_Night |
6 |
|
0 |
0 |
over 5 years ago |
0 |
|
0 |
|
Python |
| Tool for using libc infoleaks to identify libc version from within your exploit. |