MorteNoir1 / virtualbox_e1000_0dayLinks
VirtualBox E1000 Guest-to-Host Escape
☆1,412Updated 6 years ago
Alternatives and similar repositories for virtualbox_e1000_0day
Users that are interested in virtualbox_e1000_0day are comparing it to the libraries listed below
Sorting:
- Proof-of-concept for the ZombieLoad attack☆818Updated 3 years ago
- A Pwn2Own exploit chain☆758Updated 6 years ago
- Proof of Concepts (PE, PDF...)☆1,528Updated 10 months ago
- Hardware backdoors in some x86 CPUs☆2,372Updated 7 years ago
- Interactive shellcoding environment to easily craft shellcodes☆903Updated 4 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆622Updated 5 years ago
- Some of my security stuff and vulnerabilities. Nothing advanced. More to come.☆867Updated 6 years ago
- Interactive CTF Exploration Tool☆1,660Updated 4 years ago
- Avast JavaScript Interactive Shell☆675Updated 5 years ago
- a general-purpose fuzzer☆1,279Updated 7 years ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,677Updated last year
- My proof-of-concept exploits for the Linux kernel☆1,524Updated last month
- ☆471Updated 11 months ago
- DOM fuzzer☆1,755Updated 11 months ago
- A fast, parallel test case minimization tool.☆972Updated 4 years ago
- Analysis of public exploits or my 1day exploits☆616Updated 5 years ago
- arm_now is a qemu powered tool that allows instant setup of virtual machines on arm cpu, mips, powerpc, nios2, x86 and more, for reverse,…☆885Updated 3 years ago
- A tool to help you write binary exploits☆605Updated 6 years ago
- A collection where my current and future writeups for exploits/CTF will go☆763Updated 4 years ago
- Some helpful preload libraries for pwning stuff.☆1,630Updated 5 months ago
- A Javascript library for browser exploitation☆891Updated 6 years ago
- An archive of low-level CTF challenges developed over the years☆643Updated 3 years ago
- kernel privilege escalation enumeration and exploitation framework☆697Updated 7 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,268Updated 3 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,143Updated 2 years ago
- Build two PDFs that have different content but identical SHA1 sums.☆438Updated 8 months ago
- GTRS - Google Translator Reverse Shell☆619Updated last month
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆342Updated 6 years ago
- Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode☆728Updated 2 years ago
- A fork of AFL for fuzzing Windows binaries☆2,487Updated 2 months ago