RedyOpsResearchLabs / -CVE-2020-8103-Bitdefender-Antivirus-Free-EoP
CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free
☆15Updated 4 years ago
Alternatives and similar repositories for -CVE-2020-8103-Bitdefender-Antivirus-Free-EoP:
Users that are interested in -CVE-2020-8103-Bitdefender-Antivirus-Free-EoP are comparing it to the libraries listed below
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- ☆16Updated 4 years ago
- ☆11Updated 3 years ago
- Super IOCTL Basic Fuzzer☆15Updated 5 years ago
- Example for PagedOut!☆24Updated 5 years ago
- Proof of Concept code for CVE-2020-0728☆46Updated 5 years ago
- Non organized Cpp code files I used for my research on Windows☆22Updated 4 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Resources from my journey into Windows binary exploitation☆22Updated 6 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- ☆50Updated 5 years ago
- ☆24Updated 3 years ago
- PoC for CVE-2020-1015☆40Updated 4 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆98Updated 4 years ago
- ☆31Updated 4 years ago
- AMSI detection PoC☆31Updated 5 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆34Updated 4 years ago
- ☆12Updated 2 years ago
- ☆12Updated 6 months ago
- ☆28Updated 4 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- Analysis of VBS exploit CVE-2018-8174☆31Updated 6 years ago
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆28Updated 5 years ago
- Windows syscall fuzzer that I used in 2017 & 2018. Not much to say about it but maybe helpful to someone. At least syscall information it…☆20Updated 5 years ago
- ☆12Updated 4 years ago
- Procscan is a quick and dirty python script used to look for potentially dangerous api call patterns in a Procmon PML file.☆11Updated 2 years ago
- Create COM Objects backed by Scripts, not DLLs☆9Updated 7 years ago
- ☆21Updated 4 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago