πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Exploit Development

Focus Area: 🎯 Penetration Testing
20
Total Entries
18
Contributors

Top Contributors

Saumil Shah(5) Kushal Shah(3) Abinav Harsha(1) Anshul Kumar(1) Divyanshu Shekhar(1)

All Entries (20 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-12-11Tool demoBlackhat IOCTL-hammer - Parameter-Centric IOCTL Fuzzer for Windows Drivers Source Code Mohit Kulamkolly, Mohanraj Ravichandran#fuzzing#windows#vulnerability-assessment+1
2025-12-11Tool demoBlackhat ReForge: Where Crashes Become Weapons Source Code Sohan Simha Prabhakar, Samarth Bhaskar Bhat, Abinav Harsha, Danindu Gammanpilage#fuzzing#exploit-development#vulnerability-assessment+1
2020-11-11TalkPowerofcommunity Arbitrary code execution on RISC-V using fault injection Praveen Vadnala, Nils Wiersma#fault-injection#embedded-security#firmware-analysis+1
2020-09-16TalkAuscert Modern Browser Security - The First line of Defense Video Prateek Gianchandani#browser-security#exploit-development#fuzzing+1
2020-09-16TalkAuscert Software Zero-Day Discovery: A Journey from Main to Return Video Kushal Shah#fuzzing#exploit-development#vulnerability-research+1
2020-09-08TalkConfidence Software Zero-Day Discovery: A Journey from Main to Return Video Kushal Shah#zero-day#fuzzing#vulnerability-discovery+2
2020-03-18TalkCansecwest The ARM-X Firmware Emulation Framework Presentation Source Code Saumil Shah#red-teaming#arm#firmware+4
2019-11-07TalkPowerofcommunity Software Zero-Day Discovery - How To? Targets/Seeds? Methods - Fuzzing, Reverse-Engg, ‘Neither’?? Kushal Shah#vulnerability-assessment#fuzzing#reverse-engineering+2
2019-08-09Award Thrangrycat - Pwnie Award for Most Under-Hyped Research Source Code Jatin Kataria, Richard Housley, Ang Cui#reverse-engineering#hardware-embedded#firmware-analysis+2
2018-09-12Talk44con Make ARM Shellcode Great Again Presentation Video Saumil Shah#arm#embedded-systems#security-tools+3
2016-11-04TalkBlackhat Randomization Can’t Stop BPF JIT Spray Presentation Whitepaper Video N Asokan, Filippo Bonazzi, Elena Reshetova#linux#red-teaming#exploit-development
2015-02-06TalkNullcon Toliman, a Hadoop Pentesting Tool Source Code Jitendra Chauhan#security-assessment#security-tools#cloud-workload-protection+2
2014-01-28TalkOwaspappseccalifornia Application Sandboxes: Know thy limits Video Rahul Kashyap#application-pentesting#reverse-engineering#exploit-development
2013-03-01TalkNullcon Pawing the Droid: Twisting the ARM Divyanshu Shekhar, Anshul Kumar#android#arm#linux+4
2013-03-01TalkNullcon SMS to Meterpreter - Fuzzing USB Modems Video Rahul Sasi#red-teaming#fuzzing#network-pentesting+2
2008-12-06TalkClubhack Reverse Engineering for exploit writers Presentation Nibin Varghese#red-teaming#reverse-engineering#exploit-development
2006-10-19TalkHacklu Smashing Heap by Free Simulation: Presentation Sandip Chaudhari#heap#red-teaming#exploit-development+2
2006-10-19TalkHacklu Writing Metasploit plugins - from vulnerability to exploit Presentation Saumil Shah#metasploit#red-teaming#exploit-development+3
2006-08-01TalkBlackhat Writing Metasploit Plugins - from Vulnerability to Exploit Video Saumil Shah#metasploit#exploit-development#secure-coding+2
2006-04-13TalkHitbsecconf Writing Metasploit Plugins - From Vulnerability to Exploit Presentation Video Saumil Shah#metasploit#red-teaming#exploit-development+3