JaanusKaapPublic / Slides
Will try to put here slides from now on when I give a talk
☆24Updated 3 years ago
Alternatives and similar repositories for Slides:
Users that are interested in Slides are comparing it to the libraries listed below
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆17Updated 6 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 6 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- Green shellcode challenge tools☆22Updated 5 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- Resources from my journey into Windows binary exploitation☆22Updated 6 years ago
- ☆13Updated 5 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 5 years ago
- ☆14Updated 2 years ago
- keynote I gave at GreHack 2019☆18Updated 5 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Ruby ALPC Fuzzer ( joke )☆24Updated 10 years ago
- An IDA Pro script for creating a clearer idb for nymaim malware☆10Updated 6 years ago
- My conference presentations and publications☆26Updated 2 years ago
- POC for cve-2019-1458☆21Updated 4 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 7 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- Auto Inject Dll , it have three method to inject your custom dll. help you to test inject.☆9Updated 8 years ago
- Experimental Windows .text section Patch Detector☆21Updated 10 years ago
- Windows syscall fuzzer that I used in 2017 & 2018. Not much to say about it but maybe helpful to someone. At least syscall information it…☆20Updated 5 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- ☆16Updated 4 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- Static analysis tools for x86 assembly☆13Updated 7 years ago
- ☆14Updated 5 years ago
- Control Flow Guard Teleportation demo☆23Updated 5 years ago
- ☆15Updated 4 years ago
- Experimental: Windows .text section compare - disk versus memory☆14Updated 10 years ago