Alexandre-Bartel / CVE-2019-12594Links
This is a PoC for CVE-2019-12594, a vulnerability in DOSBox 0.74-2.
☆13Updated 6 years ago
Alternatives and similar repositories for CVE-2019-12594
Users that are interested in CVE-2019-12594 are comparing it to the libraries listed below
Sorting:
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated 2 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 5 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Updated 6 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Updated 5 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Updated last year
- Windows API listing in JSON format - generated from SDK headers + SDK API documentation☆66Updated 5 years ago
- General purpose repository for miscellaneous scripts, pcaps and malware IOCs that we share with the info-sec research community☆39Updated 5 years ago
- ☆35Updated 4 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- Full chain Chrome 71.0.3578.98 exploit☆19Updated 4 years ago
- ☆14Updated 2 years ago
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆22Updated 3 years ago
- Miscellaneous old Exploit code and PoCs☆16Updated last year
- POC for CVE-2021-1699☆17Updated 4 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Updated 6 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 5 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 4 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆39Updated 3 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆26Updated 2 years ago
- ☆33Updated 4 years ago
- executing JS from x86 code☆27Updated 6 years ago
- ☆18Updated 7 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 6 years ago
- Inject libraries into 32 processes on macOS Mojave☆16Updated 5 years ago
- A exe loader that can load NScript evaluation engine of Windows Defender/Microsft Security Essential. You can fuzz NScript by using this.…☆28Updated 8 years ago