Rootkitsmm-zz / cve-2016-0040
Exploiting CVE-2016-0040 uninitialized pointer
☆45Updated 8 years ago
Alternatives and similar repositories for cve-2016-0040:
Users that are interested in cve-2016-0040 are comparing it to the libraries listed below
- ☆26Updated 8 years ago
- ☆34Updated 7 years ago
- ☆33Updated 9 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- Trigger and exploit code for CVE-2014-4113☆42Updated 9 years ago
- ☆19Updated 11 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Updated 8 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 7 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 8 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆31Updated 8 years ago
- CVE-2016-0040 Privilege Escalation Exploit For WMI Receive Notification Vulnerability (x86-64)☆14Updated 6 years ago
- ☆22Updated 7 years ago
- Using SEH to bypass CFG☆29Updated 8 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow with Stack Cookie Bypass Exploit☆18Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- fragments of dirty, and quick code. possible error checking or none.☆24Updated 7 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- Writeups for PicoCTF2017 Challenges☆10Updated 8 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Updated 10 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- Automatically exported from code.google.com/p/ioctlbf☆16Updated 10 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- A pure-python win32 debugger interface.☆28Updated 9 years ago
- ☆28Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- ☆9Updated 9 years ago
- A Modern Approach☆10Updated 9 years ago