HotSpurzzZ's starred repositories
ngolo-fuzzing
Automatic fuzz targets generation for Golang packages
reven-community
Join the REVEN community. Ask questions, talk about reverse engineering, discuss REVEN, and show off your work!
Awesome-Libfuzzer-Harness
An awesome list for Effective and Powerful harnesses for fuzzing using libfuzzer - fuzzers by Google
afl-training
Exercises to learn how to fuzz with American Fuzzy Lop
libfuzzer-workshop
Repository for materials of "Modern fuzzing of C/C++ Projects" workshop.
HowToLiveLonger
程序员延寿指南 | A programmer's guide to live longer
Skr_Learning
天问之路 - 学习笔记&学习周报。内容包括但不限于C++ STL、编译原理、LLVM IR Pass代码优化、CSAPP Lab、uCore操作系统等等。
Static-Program-Analysis-Book
Getting started with static program analysis. 静态程序分析入门教程。
reven2-resources
reven2-scripts contains a set of REVEN scripts to automate timeless-analysis on REVEN traces.
CVE-2022-0847
CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”