FFRI / orom-backdoor-researchLinks
PoC code and tools for Black Hat USA 2024
☆23Updated last year
Alternatives and similar repositories for orom-backdoor-research
Users that are interested in orom-backdoor-research are comparing it to the libraries listed below
Sorting:
- BINARLY Research Tools and PoCs☆36Updated 10 months ago
- One Bootloader to Load Them All - Research materials, Code , Etc.☆52Updated 3 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 8 months ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 8 months ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated 10 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- ☆59Updated last year
- Linux kernel LPE practice with an NPD vulnerability☆36Updated 2 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆21Updated 3 years ago
- CVE-2024-30090 - LPE PoC☆107Updated 10 months ago
- Analysis of the vulnerability☆51Updated last year
- ☆48Updated 3 weeks ago
- ☆36Updated last year
- Proof-of-Concept for CVE-2024-26218☆52Updated last year
- some sploits☆17Updated 11 months ago
- rpv-web is a browser based frontend for the rpv library☆26Updated 3 months ago
- ☆24Updated 2 years ago
- ☆13Updated 10 months ago
- A collection of various exploits☆29Updated 11 months ago
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆26Updated 2 months ago
- A utility that can be used to launch an executable with a DLL injected☆20Updated last year
- Progress of learning kernel development☆14Updated 2 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆51Updated 2 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 3 weeks ago
- Universal root exploit for the linux kernel☆33Updated last year
- Identifies metadata of .NET binary files.☆21Updated last year
- Proof-of-Concept for CVE-2024-21345☆75Updated last year
- ☆37Updated 2 years ago