Alexandre-Bartel / CVE-2019-12594Links
This is a PoC for CVE-2019-12594, a vulnerability in DOSBox 0.74-2.
☆13Updated 6 years ago
Alternatives and similar repositories for CVE-2019-12594
Users that are interested in CVE-2019-12594 are comparing it to the libraries listed below
Sorting:
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 4 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Updated 6 years ago
- ☆35Updated 4 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Updated 5 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- ☆14Updated 2 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated 2 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆28Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Updated 6 years ago
- gopclntab finder and analyzer for Radare2☆20Updated 5 years ago
- Full chain Chrome 71.0.3578.98 exploit☆19Updated 4 years ago
- General purpose repository for miscellaneous scripts, pcaps and malware IOCs that we share with the info-sec research community☆39Updated 4 years ago
- Quarantine bypass and RCE vulnerability in Sketch (proof-of-concept)☆12Updated 3 years ago
- Windows API listing in JSON format - generated from SDK headers + SDK API documentation☆66Updated 5 years ago
- ☆18Updated 7 years ago
- IDA (sort of) headless☆25Updated last year
- Binary Ninja plugin that decompiles the whole binary and saves them in a directory.☆23Updated 2 years ago
- Code Coverage client for DynamoRIO☆12Updated 6 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Updated 6 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Updated 10 months ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆38Updated 3 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- POC for CVE-2021-1699☆17Updated 4 years ago
- Investigating the bug behind CVE-2021-26708☆28Updated 4 years ago
- Experiment with Linux system calls (memfd_create, fexecve, fork...)☆24Updated 6 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Updated 6 years ago
- An AFL scaling benchmarking tool☆18Updated 5 years ago
- ☆18Updated 3 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 5 years ago