Binary-Gecko / perf_PoCLinks
☆16Updated 9 months ago
Alternatives and similar repositories for perf_PoC
Users that are interested in perf_PoC are comparing it to the libraries listed below
Sorting:
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 6 months ago
- ☆33Updated last year
- Kernel Read Write Execute☆43Updated 4 months ago
- Linux kernel LPE practice with an NPD vulnerability☆36Updated last year
- Proof of concept code for CVE-2023-2008☆40Updated last year
- ☆12Updated 7 months ago
- Frida plugin for Binary Ninja☆17Updated 4 months ago
- A collection of various exploits☆28Updated 8 months ago
- Vulnerability research assistant that extracts pseudo-code from the IDA Hex-Rays decompiler.☆39Updated this week
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- V8sandbox_bypass using stack misalignment☆20Updated 9 months ago
- ☆60Updated last year
- POC of CVE-2023-35086 only DoS☆45Updated last year
- Linux rootkit for educational purposes☆31Updated last year
- Open Source eBPF Malware Analysis Framework☆48Updated 7 months ago
- ☆34Updated last year
- Diaphora Machine Learning tools and datasets☆22Updated 8 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- Another (bad) ROP gadget finder, but this time in Rust☆20Updated last year
- ☆32Updated last month
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆47Updated 8 months ago
- CVE-2024-53691☆11Updated 4 months ago
- BINARLY Research Tools and PoCs☆36Updated 8 months ago
- ☆19Updated 2 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- poc code for CVE-2024-38080☆30Updated 9 months ago
- ☆16Updated last year
- A simple Meterpreter stager written in Rust.☆38Updated 8 months ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆35Updated last year
- A few examples of how to trap virtual memory access on Windows.☆30Updated 5 months ago