IOActive / I-know-where-your-page-livesLinks
I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016
☆164Updated 8 years ago
Alternatives and similar repositories for I-know-where-your-page-lives
Users that are interested in I-know-where-your-page-lives are comparing it to the libraries listed below
Sorting:
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆134Updated 9 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Updated 10 years ago
- Content from presentation at BHUSA 2017☆180Updated 7 years ago
- windows kernel vulnerability found by me☆90Updated 7 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 8 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆264Updated 8 years ago
- kernel exploitation helper class☆77Updated 8 years ago
- ☆91Updated 8 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- C++-based shellcode builder☆114Updated 4 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆85Updated 8 years ago
- Local Kernel Debugger (LKD) is a python wrapper around dbgengine.dll☆92Updated 8 years ago
- Cross Architecture Shellcode in C☆202Updated 8 years ago
- my public code☆166Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆119Updated 8 months ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆76Updated 7 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆117Updated 6 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 9 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆145Updated 7 years ago
- Augmenting Static Reverse Engineering with Dynamic Analysis and Instrumentation☆132Updated 10 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆141Updated 8 years ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆138Updated 8 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆239Updated 8 years ago
- Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)☆139Updated 8 years ago
- A search tool for IDA☆70Updated 8 years ago
- Attacking the Core associated source files☆89Updated 7 years ago