PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)
☆25Dec 1, 2018Updated 7 years ago
Alternatives and similar repositories for CVE-2018-16712
Users that are interested in CVE-2018-16712 are comparing it to the libraries listed below
Sorting:
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- IOCTL-Flooder is a verbose tool designed to help with Windows driver fuzzing by brute forcing IOCTLs on loaded drivers. GetLastError is u…☆11Aug 21, 2018Updated 7 years ago
- WhoCalls can query a directory of files, find the binaries, and search for a user specified Win API import. It and works with both 32-bit…☆18Jul 2, 2022Updated 3 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 6 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Sep 24, 2018Updated 7 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- ☆17Mar 3, 2016Updated 10 years ago
- ☆164May 18, 2018Updated 7 years ago
- POC for CVE-2018-0824☆88Oct 18, 2022Updated 3 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- My first iOS 'jailbreak' , using CVE 2016-4655 & CVE 2016-4656☆11Jun 16, 2019Updated 6 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Jul 17, 2018Updated 7 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Jun 3, 2018Updated 7 years ago
- 漏洞复现记录☆11Jun 18, 2019Updated 6 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- CVE-2019-9729. Transferred from https://github.com/DoubleLabyrinth/SdoKeyCrypt-sys-local-privilege-elevation☆83Mar 13, 2019Updated 6 years ago
- Slides of 44Con 2018☆22Oct 11, 2018Updated 7 years ago
- public bugs/proof of concepts☆48Mar 10, 2021Updated 4 years ago
- The exploit for Panda AV LPE☆37May 22, 2019Updated 6 years ago
- POC and exploitation of vulnerabilities☆91Mar 22, 2022Updated 3 years ago
- 可能有一些你没见过的端口扫描脚本☆12Nov 28, 2018Updated 7 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- Slide deck for DefCon Beijing☆39May 15, 2018Updated 7 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 6 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Dec 3, 2018Updated 7 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Aug 6, 2023Updated 2 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆80May 10, 2018Updated 7 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- 基于360提出的Ghost Tunnel攻击复现☆135Nov 15, 2024Updated last year
- APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )☆110Sep 18, 2018Updated 7 years ago