7etsuo / deepfreeze-exploit
An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieve remote code execution with a reverse shell.
☆15Updated 2 months ago
Alternatives and similar repositories for deepfreeze-exploit:
Users that are interested in deepfreeze-exploit are comparing it to the libraries listed below
- Lena's scripts/code/resources for malware analysis☆25Updated 8 months ago
- ☆35Updated 2 months ago
- ☆18Updated 3 weeks ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated 9 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated 2 months ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆94Updated 5 months ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆34Updated 7 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆18Updated last month
- ☆31Updated 3 weeks ago
- Cheat sheet to detect and remove linux kernel rootkit☆49Updated 2 months ago
- Analyse MSI files for vulnerabilities☆124Updated 6 months ago
- Debug-assisted Argument Spoofing☆14Updated 4 months ago
- This contains notes and code for my Troopers23 Beyond Java talk☆24Updated last year
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆41Updated 8 months ago
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆49Updated 4 months ago
- A dynamic unpacking tool☆132Updated last year
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated 9 months ago
- This contains notes and slides for my Objective by the Sea talk☆96Updated last year
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆35Updated 6 months ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆47Updated last year
- A few examples of how to trap virtual memory access on Windows.☆27Updated 2 months ago
- ☆64Updated last month
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆39Updated 8 months ago
- In-Memory Rootkit For Linux☆70Updated 2 weeks ago