CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free
☆16Jun 8, 2020Updated 5 years ago
Alternatives and similar repositories for -CVE-2020-8103-Bitdefender-Antivirus-Free-EoP
Users that are interested in -CVE-2020-8103-Bitdefender-Antivirus-Free-EoP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generates dnSpy themes based on IntelliJ themes☆14Jan 1, 2021Updated 5 years ago
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆12Jun 7, 2021Updated 4 years ago
- A way to bypass adblock for Matomo/Piwik☆17Dec 11, 2020Updated 5 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- PHP Obfuscator☆13Sep 9, 2021Updated 4 years ago
- Alleycat plugin by devttys0, ported to IDA 7☆16Apr 29, 2018Updated 7 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- ☆13Jun 26, 2021Updated 4 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- Breaking secure checksums in the scudo heap allocator☆13Apr 9, 2020Updated 5 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18May 29, 2020Updated 5 years ago
- Wwh's blog Analyze .NET Obfuscator and How to unpack it [Translates to English Version]☆22Dec 26, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- DEAMON Tools Lite Patcher/Unlocker☆17Dec 31, 2020Updated 5 years ago
- Simple and fast proxy checker☆19Feb 17, 2020Updated 6 years ago
- Simple Packer .NET☆20Jun 21, 2020Updated 5 years ago
- CVE-2020-27950 exploit☆34Dec 1, 2020Updated 5 years ago
- IRPT: The Art, Science, and Engineering of Windows driver fuzzing☆21Mar 26, 2021Updated 5 years ago
- ☆31Jul 27, 2020Updated 5 years ago
- A multi purpose discord self bot with bypass capabilities.☆19Apr 1, 2021Updated 4 years ago
- Implementation of kexstat via /dev/kmem with kernel ASLR support☆36Dec 5, 2015Updated 10 years ago
- HookDetector.NET is a .NET Library to detect hooks in API functions☆27Nov 21, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- dll embeddable☆17Oct 21, 2020Updated 5 years ago
- Simple way to disable/rename buttons from a task manager☆30Feb 17, 2020Updated 6 years ago
- Basic C# Project that will take an MSBuild payload and run it with MSBuild via ClickOnce.☆93Oct 24, 2020Updated 5 years ago
- CVE-2020-5837 exploit☆42May 13, 2020Updated 5 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆54Jun 25, 2020Updated 5 years ago
- The exploit for Panda AV LPE☆37May 22, 2019Updated 6 years ago
- Target components for kAFL/Nyx Fuzzer☆33Jul 21, 2025Updated 8 months ago
- on Mac 10.12.2☆20Aug 3, 2018Updated 7 years ago
- iOS/macOS: task_swap_mach_voucher() does not respect MIG semantics leading to use-after-free☆11Jan 30, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆135Dec 15, 2019Updated 6 years ago
- adobe reader sandbox utility☆11Aug 7, 2020Updated 5 years ago
- Basic image, text & file uploader CDN for ShareX☆25Nov 14, 2021Updated 4 years ago
- ☆27Jan 8, 2022Updated 4 years ago
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 2 months ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago