7etsuo / deepfreeze-exploitLinks
An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieve remote code execution with a reverse shell.
☆19Updated 7 months ago
Alternatives and similar repositories for deepfreeze-exploit
Users that are interested in deepfreeze-exploit are comparing it to the libraries listed below
Sorting:
- Binary Golf Grand Prix☆61Updated 4 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆97Updated 10 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated this week
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆120Updated 2 months ago
- ☆123Updated last year
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆41Updated last year
- In-Memory Rootkit For Linux and BSD☆72Updated last week
- exploits for CVE-2024-20017☆139Updated 11 months ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆135Updated last year
- Collection of codes focused on Linux rootkits☆143Updated last month
- A delicious, but malicious SSL-VPN server 🌮☆243Updated last week
- ☆19Updated last month
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆108Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 7 months ago
- ☆67Updated 6 months ago
- Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge☆66Updated 7 months ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆168Updated last year
- ☆147Updated last year
- ☆37Updated 7 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆81Updated 5 months ago
- Get root via TTY / TIOCSTI stuffing☆76Updated 2 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆117Updated 3 months ago
- PoC for CVE-2024-48990☆98Updated 8 months ago
- A dynamic unpacking tool☆137Updated last year
- ZYRA: Your Runtime Armor. ZYRA is an Zig-written obfuscator/packer for executable binaries.☆53Updated this week
- Offensive Lua.☆191Updated last year
- Z2A-BlackLotus Challenge stage 2 bootkit-rootkit analysis☆16Updated 2 years ago
- Turn binaries into music☆50Updated last year