Corruption and Perturbation Robustness (ICLR 2019)
Coc source from fenoxo
CVE-2018-8174 - VBScript memory corruption exploit.
Repository to train/learn memory corruption on the ARM platform.
Explanation and fix for the Magento Enterprise '100 router match iterations' / Community 'no 404 CMS page configured' bug
Hardcore corruption of my execve() vulnerability in WSL
Benchmarking Robustness of 3D Object Detection to Common Corruptions in Autonomous Driving, CVPR 2023
Advanced buffer overflow and memory corruption security challenges
This repository provides code for "On Interaction Between Augmentations and Corruptions in Natural Corruption Robustness".
chap analyzes un-instrumented core files for leaks, memory growth, and corruption
A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber
Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)
Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stage during the Pwn2Own Miami 2022 competition.
A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap
A tc command wrapper. Make it easy to set up traffic control of network bandwidth/latency/packet-loss/packet-corruption/etc. to a network-interface/Docker-container(veth).
A collection of Evil String for Windows that causes various type of crash, bsod, filesystem corruption, etc. 💀💀💀
Monorepo boilerplate using Nestjs, authentication, docker, redis, secrets service, logs service, libs structure, anti corruption layer pattern, adapter pattern, dependency inversion pattern, mongodb, ...
Terraform module that provision an S3 bucket to store the `terraform.tfstate` file and a DynamoDB table to lock the state file to prevent concurrent modifications and state corruption.
Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
翻译 - Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
This is a simple filter that will block any attempt to access streams beginning with ":$i30:". This stops the spurious corruption warning triggered on certain Windows 10 versions.
翻译 - 这是一个简单的过滤器,它将阻止任何尝试访问以“:$ i30:”开头的流的尝试。这将停止在某些Windows 10版本上触发的虚假损坏警告。
iReporter is a web app that enables citizens bring any form of corruption to the notice of appropriate authorities and the general public.
Implementation of SCARF: Self-Supervised Contrastive Learning using Random Feature Corruption in Pytorch, a model learning a representation of tabular data using contrastive learning. It is inspired f...