Rootkitsmm-zz / cve-2016-0040Links
Exploiting CVE-2016-0040 uninitialized pointer
☆45Updated 8 years ago
Alternatives and similar repositories for cve-2016-0040
Users that are interested in cve-2016-0040 are comparing it to the libraries listed below
Sorting:
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- ☆35Updated 9 years ago
- ☆26Updated 8 years ago
- ☆19Updated 11 years ago
- ☆22Updated 7 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆31Updated 8 years ago
- Exploit collection for NT privilege escalation☆65Updated 9 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 8 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Updated 8 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- Writeups for PicoCTF2017 Challenges☆10Updated 8 years ago
- Trigger and exploit code for CVE-2014-4113☆42Updated 9 years ago
- ☆34Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 10 years ago
- ☆39Updated 4 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Updated 10 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆42Updated 8 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 8 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Updated 8 years ago
- Automatically exported from code.google.com/p/ioctlbf☆16Updated 10 years ago