0vercl0k / pwn2own2023-miamiLinks
Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category.
☆60Updated last year
Alternatives and similar repositories for pwn2own2023-miami
Users that are interested in pwn2own2023-miami are comparing it to the libraries listed below
Sorting:
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆66Updated last year
- ☆33Updated last year
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆48Updated 10 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆52Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 5 months ago
- ☆71Updated last year
- ☆60Updated last year
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- V8sandbox_bypass using stack misalignment☆19Updated 9 months ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆74Updated 3 months ago
- Leveraging patch diffing to discover new vulnerabilities☆121Updated 7 months ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 6 months ago
- ☆80Updated 9 months ago
- Proof of concept code for CVE-2023-2008☆37Updated last year
- Analysis of the vulnerability☆51Updated last year
- poc code for CVE-2024-38080☆30Updated 9 months ago
- ☆26Updated last year
- ☆69Updated 2 years ago
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆61Updated 6 months ago
- ☆23Updated 9 months ago
- ☆23Updated 4 months ago
- ☆34Updated last year
- Proof-of-Concept of exploits that may be published☆20Updated 7 months ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆115Updated last year
- ☆35Updated last year
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Updated last year
- javascript extension of windbg for hacker.☆15Updated last year
- Collection of slides☆33Updated last year
- ☆32Updated 4 months ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago