CENSUS / windows_10_rs2_rs3_exploitation_primitivesView external linksLinks
Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk
☆57Feb 27, 2018Updated 7 years ago
Alternatives and similar repositories for windows_10_rs2_rs3_exploitation_primitives
Users that are interested in windows_10_rs2_rs3_exploitation_primitives are comparing it to the libraries listed below
Sorting:
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- HITCON CTF 2018☆46Oct 22, 2018Updated 7 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- Slides of 44Con 2018☆22Oct 11, 2018Updated 7 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Apr 18, 2019Updated 6 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Feb 24, 2019Updated 6 years ago
- VirtualBox 3D exploits & PoCs☆162Jan 24, 2019Updated 7 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆91Feb 15, 2019Updated 7 years ago
- ☆100Aug 28, 2018Updated 7 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Aug 22, 2018Updated 7 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆95Nov 4, 2021Updated 4 years ago
- Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018☆180Feb 7, 2024Updated 2 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Jul 20, 2019Updated 6 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- ☆13Jul 31, 2020Updated 5 years ago
- Automatically generate ASM.JS JIT-Spray payloads☆36Mar 14, 2018Updated 7 years ago
- vm escape exploit☆39Sep 24, 2017Updated 8 years ago
- ☆17May 13, 2019Updated 6 years ago
- ☆152Jan 7, 2020Updated 6 years ago
- Arbitrary code execution with kernel privileges using CVE-2018-8897.☆421May 18, 2018Updated 7 years ago
- QEMU to drcov trace file☆11Nov 21, 2020Updated 5 years ago
- iOS/macOS: task_swap_mach_voucher() does not respect MIG semantics leading to use-after-free☆11Jan 30, 2019Updated 7 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆217Feb 2, 2018Updated 8 years ago
- My Chrome and Safari exploit code + write-up repo☆531Nov 5, 2021Updated 4 years ago
- ☆18May 18, 2018Updated 7 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆440Apr 11, 2025Updated 10 months ago
- POC and exploitation of vulnerabilities☆91Mar 22, 2022Updated 3 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆82Sep 1, 2018Updated 7 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Mar 8, 2018Updated 7 years ago
- Proof of Concept of TrustZone exploit☆16Aug 10, 2025Updated 6 months ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆114Oct 8, 2018Updated 7 years ago
- Simple library to spray the Windows Kernel Pool☆110Jan 6, 2020Updated 6 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- exploit termdd.sys(support kb4499175)☆61Jul 15, 2019Updated 6 years ago
- ☆105Dec 9, 2019Updated 6 years ago