86hh / cfg-teleport-demoView external linksLinks
Control Flow Guard Teleportation demo
☆23Jul 28, 2019Updated 6 years ago
Alternatives and similar repositories for cfg-teleport-demo
Users that are interested in cfg-teleport-demo are comparing it to the libraries listed below
Sorting:
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- ☆21Jun 3, 2021Updated 4 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- POC viruses I have created to demo some ideas☆59Apr 12, 2020Updated 5 years ago
- Toshiba MeP-c4 for Ghidra☆22May 29, 2019Updated 6 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- ☆13Dec 24, 2023Updated 2 years ago
- ☆17Oct 5, 2020Updated 5 years ago
- ollvm 4.0 using clang 10.0.1☆14Mar 22, 2021Updated 4 years ago
- CVE-2021-39685 Description and sample exploit for Linux USB Gadget overflow vulnerability☆14Apr 28, 2022Updated 3 years ago
- This is a place to share my miscellaneous projects.☆116May 2, 2020Updated 5 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Asus AsIO2 Local Privilege Escalation exploit (based on ReWolf's MSI exploit)☆14Apr 5, 2020Updated 5 years ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- Integrate the dharma grammar fuzzer into honggfuzz☆26Aug 11, 2017Updated 8 years ago
- Man in the middle for NLA enabled RDP in python☆15Nov 26, 2021Updated 4 years ago
- ☆135Dec 15, 2019Updated 6 years ago
- The Demo for CVE-2018-1000006☆40Jan 25, 2018Updated 8 years ago
- ☆26Dec 8, 2025Updated 2 months ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- Tools released in CSS 2019☆38Aug 1, 2019Updated 6 years ago
- A repository for my conference presentations☆35Feb 18, 2020Updated 6 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub☆79Jul 2, 2012Updated 13 years ago
- Toolkit for Hyper-V security research☆157Mar 7, 2022Updated 3 years ago
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Apr 16, 2021Updated 4 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 9 months ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- A fork of AFL for fuzzing Windows binaries☆23May 3, 2018Updated 7 years ago
- ☆18Aug 5, 2020Updated 5 years ago
- Continuous Rust Fuzzing Example☆15Aug 4, 2020Updated 5 years ago
- Simple poc of CVE-2018-8414 Windows Package Setting RCE Vulnerability☆22Sep 21, 2020Updated 5 years ago
- IDA plugin to explore and browse tags☆55Jul 19, 2019Updated 6 years ago
- An open source library for operating the Windows Overlay Filter driver.☆22Jan 16, 2019Updated 7 years ago
- implement a vba interpreter in java☆21Dec 12, 2017Updated 8 years ago
- A Zhiyuan OA Collaborative Office Remote Code Execution Vulnerability on Windows☆37Jun 27, 2019Updated 6 years ago
- ☆43Aug 30, 2018Updated 7 years ago