MorteNoir1 / virtualbox_e1000_0dayLinks
VirtualBox E1000 Guest-to-Host Escape
☆1,414Updated 6 years ago
Alternatives and similar repositories for virtualbox_e1000_0day
Users that are interested in virtualbox_e1000_0day are comparing it to the libraries listed below
Sorting:
- Proof-of-concept for the ZombieLoad attack☆817Updated 3 years ago
- Hardware backdoors in some x86 CPUs☆2,375Updated 6 years ago
- Avast JavaScript Interactive Shell☆674Updated 5 years ago
- Interactive shellcoding environment to easily craft shellcodes☆898Updated 4 years ago
- Some of my security stuff and vulnerabilities. Nothing advanced. More to come.☆867Updated 6 years ago
- Interactive CTF Exploration Tool☆1,661Updated 3 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆626Updated 5 years ago
- A Pwn2Own exploit chain☆759Updated 6 years ago
- ☆470Updated 9 months ago
- Proof of Concepts (PE, PDF...)☆1,522Updated 8 months ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,671Updated last year
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆959Updated 4 years ago
- a general-purpose fuzzer☆1,281Updated 7 years ago
- Analysis of public exploits or my 1day exploits☆620Updated 4 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 6 years ago
- DOM fuzzer☆1,751Updated 9 months ago
- Wannacry in-memory key recovery☆1,089Updated 8 years ago
- Build two PDFs that have different content but identical SHA1 sums.☆438Updated 6 months ago
- kernel privilege escalation enumeration and exploitation framework☆697Updated 7 years ago
- A tool to help you write binary exploits☆610Updated 6 years ago
- Linux rootkit for Ubuntu 16.04 and 10.04 (Linux Kernels 4.4.0 and 2.6.32), both i386 and amd64☆808Updated last year
- A fast, parallel test case minimization tool.☆972Updated 4 years ago
- A Javascript library for browser exploitation☆889Updated 6 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,265Updated 2 years ago
- arm_now is a qemu powered tool that allows instant setup of virtual machines on arm cpu, mips, powerpc, nios2, x86 and more, for reverse,…☆881Updated 2 years ago
- Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode☆730Updated 2 years ago
- My proof-of-concept exploits for the Linux kernel☆1,482Updated 3 years ago
- A collection where my current and future writeups for exploits/CTF will go☆763Updated 4 years ago
- A curated list of awesome projects, articles and the other materials powered by Radare2☆725Updated 5 years ago
- An archive of low-level CTF challenges developed over the years☆641Updated 3 years ago