by http://whereisk0shl.top/
☆35Jul 9, 2018Updated 7 years ago
Alternatives and similar repositories for WCTF-pigdriver
Users that are interested in WCTF-pigdriver are comparing it to the libraries listed below
Sorting:
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 7 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- windbg plugin for win32k debugging☆75Oct 14, 2019Updated 6 years ago
- ☆14Jul 9, 2018Updated 7 years ago
- ☆16Jun 25, 2018Updated 7 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆80May 10, 2018Updated 7 years ago
- Some python scripts are used to export userdata from huge idb(ida's database),ida 7.0 support only☆21Oct 18, 2018Updated 7 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆69Jul 9, 2018Updated 7 years ago
- BlazeFox Exploit☆18Oct 13, 2018Updated 7 years ago
- xnu kernel heap info leak☆71Nov 21, 2019Updated 6 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- HITCON CTF 2018☆46Oct 22, 2018Updated 7 years ago
- Some kernel fuzzing paper about windows and linux☆255Oct 9, 2017Updated 8 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- Simple poc of CVE-2018-8414 Windows Package Setting RCE Vulnerability☆22Sep 21, 2020Updated 5 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated last week
- Windows device tree walker☆15Sep 19, 2018Updated 7 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- CDB-PIg is a plugin for cdb, but not windbg.☆11Nov 29, 2018Updated 7 years ago
- bctf2017 challenges☆11Apr 20, 2017Updated 8 years ago
- L'application pour bloquer un paquet, snipping, analyser le réseau☆11Dec 23, 2016Updated 9 years ago
- kernel exploit POC for vulnerability i found in amd gpu driver☆11Jan 6, 2023Updated 3 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- PinVMP:虚拟化代码辅助分析工具☆148May 27, 2018Updated 7 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 8 years ago
- Browser Fuzzing with Machine Learning☆22Mar 6, 2019Updated 6 years ago
- 💉 Personal project that I inject into games for debugging☆20Nov 30, 2016Updated 9 years ago
- QWB 2019 official writeups☆64May 28, 2019Updated 6 years ago
- ☆47Dec 29, 2018Updated 7 years ago
- A 0day exploit for ur0‘s apfs bug by me (Pwn20wnd)☆126Jun 14, 2018Updated 7 years ago
- IDA反-反调试插件 IDAStealth v1.3.3, created 06/28/2011, Jan Newger☆21Apr 4, 2018Updated 7 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆34Jun 6, 2021Updated 4 years ago
- All ctf challs and scripts (and writeup, maybe) from 0ops.☆150Apr 13, 2023Updated 2 years ago
- 基于WinDivert实现的一个包过滤与截断程序☆13Jul 22, 2018Updated 7 years ago
- ☆18Feb 6, 2019Updated 7 years ago