PinkNoize / shelf-loader-pocLinks
☆12Updated 4 years ago
Alternatives and similar repositories for shelf-loader-poc
Users that are interested in shelf-loader-poc are comparing it to the libraries listed below
Sorting:
- ☆18Updated 5 years ago
- ☆50Updated 3 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- ☆28Updated 6 years ago
- Google Chrome Use After Free☆61Updated 3 years ago
- ☆13Updated 3 years ago
- ☆48Updated 5 years ago
- ☆24Updated 4 years ago
- Extract data of TTD trace file to a minidump☆31Updated 2 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆123Updated 3 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- ☆64Updated last year
- ☆14Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- Inter-Process Communication Mechanisms☆28Updated 5 years ago
- ☆16Updated 4 years ago
- A collection of various exploits☆28Updated last year
- A collection of shellcode hashes☆17Updated 7 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- NASM Linux x86_64 pure (no deps) shared library (.so), POC for Reflective ELF SO injection☆31Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- Super IOCTL Basic Fuzzer☆15Updated 6 years ago
- Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron appli…☆31Updated 3 weeks ago
- ☆91Updated 5 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- Slides from various conference talks☆37Updated 2 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆45Updated 4 years ago