☆21Mar 24, 2015Updated 11 years ago
Alternatives and similar repositories for cve-2015-0313
Users that are interested in cve-2015-0313 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- Experiments related to CVE-2015-3456☆12May 27, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Jan 10, 2017Updated 9 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Jan 29, 2015Updated 11 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- ☆15Oct 27, 2015Updated 10 years ago
- Gain privileges:system -> root,as a part of https://github.com/retme7/CVE-2014-7911_poc☆94Jan 27, 2015Updated 11 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Adobe Flash Player File Instrumentation Tool For Security Research☆86Sep 3, 2022Updated 3 years ago
- Windows kernel vulnerability in win32k.sys Driver☆35Dec 6, 2015Updated 10 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- ☆26Jan 18, 2026Updated 2 months ago
- ☆44Dec 23, 2014Updated 11 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Exploiting MS15-061 local Privilege escalation☆49Sep 22, 2015Updated 10 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆60Jan 11, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Visually Monitor Heap Allocations and Frees☆18Feb 24, 2020Updated 6 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- xnu local privilege escalation via cve-2015-1140 IOHIDSecurePromptClient injectStringGated heap overflow | poc||gtfo☆72Mar 20, 2015Updated 11 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 8 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆40Dec 28, 2016Updated 9 years ago
- Valgrind extension for whitebox fuzz testing☆30Jul 10, 2009Updated 16 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Aug 21, 2014Updated 11 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- ☆105Apr 20, 2015Updated 10 years ago
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆46Jul 2, 2016Updated 9 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago