[Patched] Sandbox escape Chrome exploit. Allows the execution of local binaries, read/write functions and exfiltration of Chrome OAuth tokens to remote server. More info: https://bugs.chromium.org/p/chromium/issues/detail?id=386988
☆29Oct 13, 2017Updated 8 years ago
Alternatives and similar repositories for Chrome-Sandbox-Exploit
Users that are interested in Chrome-Sandbox-Exploit are comparing it to the libraries listed below
Sorting:
- ☆21May 10, 2017Updated 8 years ago
- Services and Drivers control application☆19Jul 24, 2017Updated 8 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Ssdt Hook Detection tool☆13Nov 11, 2016Updated 9 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- ☆11Sep 28, 2017Updated 8 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆16Oct 18, 2016Updated 9 years ago
- An av windows engine with file guard and compress file enumator☆12Aug 25, 2018Updated 7 years ago
- Viewing NTFS alternate streams in files☆33Jul 19, 2017Updated 8 years ago
- 虚拟机逃逸exp工具 VMware Escape Exploit before VMware WorkStation 12.5.5☆10Sep 10, 2017Updated 8 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- analyze the content of the pe file on windows, and shell(pack) function for windows drivers.☆11Nov 9, 2018Updated 7 years ago
- A dark theme for WinDBG.☆35Jul 9, 2014Updated 11 years ago
- ☆17Oct 24, 2016Updated 9 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- Hex Studio is a work in progress Hex viewer and editor.☆25Jun 7, 2017Updated 8 years ago
- User-mode kernel callback framework☆10Nov 16, 2013Updated 12 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- Use Intel Pin tools to analysis binary.☆38Jul 19, 2015Updated 10 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- Today Plugin (x64) - A Plugin For x64dbg☆13Jul 17, 2018Updated 7 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- ☆11Mar 11, 2015Updated 11 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- Full chain Chrome 71.0.3578.98 exploit☆22Jul 18, 2021Updated 4 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- Lua Extension for Windbg☆21Oct 22, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/guardlite☆11Jul 2, 2015Updated 10 years ago
- C++ wrapper for the Windows structured storage implementation known as Compound Files☆20Aug 30, 2020Updated 5 years ago
- Monitor adapter, Fake DNS, Tunnel, and DHCP combined into one Windows Service☆12Apr 19, 2015Updated 10 years ago
- ☆10Sep 29, 2019Updated 6 years ago