IOActive / I-know-where-your-page-lives
I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016
☆159Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for I-know-where-your-page-lives
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 7 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆132Updated 8 years ago
- windows kernel vulnerability found by me☆91Updated 7 years ago
- ☆91Updated 8 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆97Updated 7 years ago
- Some example source code for fixed IE11 sandbox escapes.☆139Updated 10 years ago
- Small tool for generating ropchains using unicorn and z3☆197Updated 6 years ago
- kernel exploitation helper class☆75Updated 7 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆263Updated 7 years ago
- Content from presentation at BHUSA 2017☆179Updated 7 years ago
- C++-based shellcode builder☆112Updated 4 years ago
- Cross Architecture Shellcode in C☆198Updated 8 years ago
- An open source, multi-architecture ROP compiler written in python☆160Updated 7 years ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆136Updated 7 years ago
- my public code☆167Updated 7 years ago
- Local Kernel Debugger (LKD) is a python wrapper around dbgengine.dll☆92Updated 8 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆214Updated 6 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆81Updated 7 years ago
- IDAtropy is a plugin for Hex-Ray's IDA Pro designed to generate charts of entropy and histograms using the power of idapython and matplot…☆135Updated 3 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆235Updated 8 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆116Updated 6 years ago
- Use CVE-2016-3308 corrupt win32k desktop heap☆50Updated 8 years ago
- grap: define and match graph patterns within binaries☆169Updated 3 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 8 years ago
- Implementation of the SMM rootkit "The Watcher"☆123Updated 2 years ago