Hackers to Hackers Conference (H2HC) presentation in São Paulo
☆38Dec 16, 2024Updated last year
Alternatives and similar repositories for H2HC-2024
Users that are interested in H2HC-2024 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- kAFL Fuzzer☆38Mar 16, 2026Updated last week
- Implementation of Silvio Cesare text infection technic☆10Jan 5, 2018Updated 8 years ago
- Proof-of-Concept for CVE-2024-21345☆78Apr 26, 2024Updated last year
- Patches the AmsiScan function in clr.dll allowing for unrestricted assembly loading in .NET☆51May 5, 2025Updated 10 months ago
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆157Nov 23, 2025Updated 4 months ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆97Aug 21, 2025Updated 7 months ago
- Harness for fuzzing GoldSrc file formats with WinAFL☆20Apr 26, 2020Updated 5 years ago
- ☆11Feb 13, 2024Updated 2 years ago
- ☆16Jun 23, 2024Updated last year
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- ☆20Dec 4, 2023Updated 2 years ago
- SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.☆19Apr 14, 2025Updated 11 months ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Jan 14, 2025Updated last year
- Easy encrypt/decrypt data with TPM☆25Feb 28, 2024Updated 2 years ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆131Mar 22, 2024Updated 2 years ago
- Google Chrome Use After Free☆61May 23, 2022Updated 3 years ago
- WinAFL modified for RDP client fuzzing☆20Dec 18, 2022Updated 3 years ago
- ☆12Jun 8, 2018Updated 7 years ago
- A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.☆111Mar 10, 2024Updated 2 years ago
- a network filter using NDIS hook technique☆19Mar 28, 2013Updated 12 years ago
- ☆91Aug 16, 2025Updated 7 months ago
- Proof-of-Concept for CVE-2024-26218☆56Apr 26, 2024Updated last year
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- ☆26Dec 17, 2021Updated 4 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Oct 18, 2022Updated 3 years ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆55May 12, 2025Updated 10 months ago
- Some Code Samples for Windows based Inter-Process-Communication (IPC)☆211Feb 29, 2024Updated 2 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- Snapshot fuzzing with KVM and LibAFL☆96Aug 21, 2022Updated 3 years ago
- Target components for kAFL/Nyx Fuzzer☆34Jul 21, 2025Updated 8 months ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆30Nov 6, 2022Updated 3 years ago
- a tool used to analyze and monitor in named pipes☆194Oct 27, 2024Updated last year
- ☆34Jul 4, 2023Updated 2 years ago
- ☆84Dec 11, 2024Updated last year
- Windows Injection 101: from Zero to ROP (HITCON 2017)☆29Aug 27, 2017Updated 8 years ago
- CVE-2025-3248 Langflow RCE Exploit☆17Jun 17, 2025Updated 9 months ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated last month