CiscoCXSecurity / CVE-2015-5119_walkthroughView external linksLinks
Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough
☆13Sep 10, 2015Updated 10 years ago
Alternatives and similar repositories for CVE-2015-5119_walkthrough
Users that are interested in CVE-2015-5119_walkthrough are comparing it to the libraries listed below
Sorting:
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- A static Internet Explorer Fuzzer.☆50Jun 15, 2017Updated 8 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by…☆13Aug 29, 2016Updated 9 years ago
- ☆12Aug 4, 2015Updated 10 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Windows kernel vulnerability in win32k.sys Driver☆35Dec 6, 2015Updated 10 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- Windows 8.1 + IE 11 Exploit☆18Jul 26, 2016Updated 9 years ago
- Simple poc of CVE-2018-8414 Windows Package Setting RCE Vulnerability☆22Sep 21, 2020Updated 5 years ago
- XED based Disassembly Engine☆21Apr 23, 2018Updated 7 years ago
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 7 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- HitCon 2015 spartan 0day & exploit☆27Sep 1, 2015Updated 10 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 5 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- python inspect rootkit tool☆33Oct 17, 2013Updated 12 years ago
- Plugins for the Volatility framework☆18Oct 30, 2015Updated 10 years ago
- WinEoP Exploitation Framework☆25Jan 7, 2016Updated 10 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆40Dec 28, 2016Updated 9 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Mar 12, 2014Updated 11 years ago
- ☆10Jul 30, 2017Updated 8 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Windows device tree walker☆15Sep 19, 2018Updated 7 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- L'application pour bloquer un paquet, snipping, analyser le réseau☆11Dec 23, 2016Updated 9 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Oct 26, 2025Updated 3 months ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- ☆22May 25, 2017Updated 8 years ago