MorteNoir1 / virtualbox_e1000_0dayLinks
VirtualBox E1000 Guest-to-Host Escape
☆1,410Updated 6 years ago
Alternatives and similar repositories for virtualbox_e1000_0day
Users that are interested in virtualbox_e1000_0day are comparing it to the libraries listed below
Sorting:
- Avast JavaScript Interactive Shell☆672Updated 5 years ago
- Proof-of-concept for the ZombieLoad attack☆817Updated 3 years ago
- Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU☆1,666Updated last year
- Interactive CTF Exploration Tool☆1,656Updated 3 years ago
- Interactive shellcoding environment to easily craft shellcodes☆894Updated 4 years ago
- Hardware backdoors in some x86 CPUs☆2,368Updated 6 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆625Updated 4 years ago
- Proof of Concepts (PE, PDF...)☆1,502Updated 5 months ago
- A Pwn2Own exploit chain☆761Updated 6 years ago
- My proof-of-concept exploits for the Linux kernel☆1,472Updated 3 years ago
- ☆469Updated 6 months ago
- Some of my security stuff and vulnerabilities. Nothing advanced. More to come.☆866Updated 5 years ago
- Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode☆729Updated 2 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆956Updated 4 years ago
- A fast, parallel test case minimization tool.☆959Updated 4 years ago
- Some helpful preload libraries for pwning stuff.☆1,613Updated 2 weeks ago
- A collection of links related to VMware escape exploits☆1,432Updated 9 months ago
- An archive of low-level CTF challenges developed over the years☆633Updated 3 years ago
- kernel privilege escalation enumeration and exploitation framework☆690Updated 6 years ago
- GTRS - Google Translator Reverse Shell☆615Updated 7 months ago
- ☆352Updated 3 years ago
- A Javascript library for browser exploitation☆885Updated 6 years ago
- DOM fuzzer☆1,736Updated 6 months ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,112Updated 4 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆679Updated 3 years ago
- A curated list of awesome projects, articles and the other materials powered by Radare2☆723Updated 5 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,260Updated 2 years ago
- UAC bypass, Elevate, Persistence methods☆2,685Updated 2 years ago
- A collection where my current and future writeups for exploits/CTF will go☆760Updated 4 years ago
- mXtract - Memory Extractor & Analyzer☆592Updated 3 years ago