☆26Jun 23, 2016Updated 9 years ago
Alternatives and similar repositories for PoCs
Users that are interested in PoCs are comparing it to the libraries listed below
Sorting:
- ☆140Jul 17, 2017Updated 8 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆40Dec 28, 2016Updated 9 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆33Mar 30, 2018Updated 7 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Jun 14, 2017Updated 8 years ago
- windows kernel vulnerability found by me☆90Aug 28, 2017Updated 8 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆114Jun 23, 2016Updated 9 years ago
- ☆79May 13, 2016Updated 9 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Feb 15, 2017Updated 9 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- Lua Extension for Windbg☆21Oct 22, 2018Updated 7 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆119Apr 19, 2018Updated 7 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- ☆32Nov 15, 2017Updated 8 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Nov 28, 2017Updated 8 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Nov 29, 2016Updated 9 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Sep 10, 2016Updated 9 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- A Genetic File, Syscall and Network Fuzzer.☆58May 28, 2017Updated 8 years ago
- Black Hat 2016 Slides, Paper and Code☆83Aug 10, 2016Updated 9 years ago
- ☆48Nov 28, 2016Updated 9 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Updated this week
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- ☆10Jul 30, 2017Updated 8 years ago
- Proof of concept for CVE-2018-4150 by @cmwdotme☆14May 8, 2018Updated 7 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆26Sep 3, 2016Updated 9 years ago
- REIL translation library☆36May 6, 2016Updated 9 years ago