7etsuo / deepfreeze-exploitLinks
An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieve remote code execution with a reverse shell.
☆20Updated last year
Alternatives and similar repositories for deepfreeze-exploit
Users that are interested in deepfreeze-exploit are comparing it to the libraries listed below
Sorting:
- Binary Exploitation Phrack CTF Challenge☆140Updated 5 months ago
- Binary Golf Grand Prix☆83Updated 3 weeks ago
- ☆72Updated 11 months ago
- In-Memory Rootkit For Linux and BSD☆86Updated 5 months ago
- VulnServer ROP: An Educational Platform for Exploring Buffer Overflow Vulnerabilities and Return-Oriented Programming Techniques☆17Updated last year
- Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge☆71Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Updated last year
- ☆20Updated last week
- Generate backdoored RSA keys using SETUP☆226Updated last month
- ☆39Updated last year
- ☆150Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 5 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆45Updated last year
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆260Updated 3 months ago
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆96Updated 3 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆130Updated 9 months ago
- Collection of codes focused on Linux rootkits☆192Updated 2 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆121Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated 2 weeks ago
- A Windows Named Pipe Multi-tool / Proxy☆240Updated last month
- Cheat sheet to detect and remove linux kernel rootkit☆77Updated last year
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆149Updated last year
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆125Updated 6 months ago
- This is practice VM for malware development☆175Updated 2 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆83Updated 5 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆136Updated 7 months ago
- Direct access to NTFS volumes☆292Updated 4 months ago