A Javascript library for browser exploitation
Objection - runtime mobile exploration
x86 and x64 assembly "read-eval-print-loop" shell
List of awesome malware analysis tools and resources
Intel HAXM (Qemu accelerator for Windows and MacOS)
S2E Documentation and Quick Start Guides
An open source deep-learning toolkit
NIPS 2017 Accepted Papers
BlackHat Europe 2017 briefings
Ruxcon 2017 slides
From Out of Memory to Remote Code Execution, slides
Exploiting Firefox through the Javascript engine, slides
A view into ALPC-RPC (CVE-2017-11783), slides
Corrupting Memory In Microsoft Office Protected-View Sandbox, slides
The Art of Fuzzing, slides
Windows Kernel pool address leak via undocumented GetFontData feature in ATMFD
Kernel Exploit Demo - Windows 10 privesc via WARBIRD
Skeleton in the closet. MS Office vulnerability you didn't know about (CVE-2017-11882)
CVE-2017-11826 Exploited in the Wild with Politically Themed RTF Document
Exploiting CVE-2017-5123, a Linux kernel vulnerability in the waitid() syscall
The path pivot attack (CVE-2017-2619)
Vulnerability Walkthrough: 7zip CVE-2016-2334 HFS+ Code Execution Vulnerability
Getting Local Admin by Abusing the Anti-Virus Quarantine
Application Introspection & Hooking With Frida
Hook the planet! Solving FlareOn4 Challenge6 with libPeConv
Analyzing KaiXin Exploit Kit
Dissecting Golroted Trojan's Process Hollowing Technique & UAC Bypass
Analysis of Malicious Documents- Part 5
Windows oneliners to download remote payload and execute arbitrary code
Digital Forensics – Artifacts of interactive sessions
A Sampling of Anti-Decompilation Techniques
Architecture Agnostic Function Detection In Binaries
Afl-unicorn: Fuzzing Arbitrary Binary Code
Neural fuzzing: applying DNN to software security testing
Drammer: Flip Feng Shui Goes Mobile