anyaschukin / OverRide
Binary Exploitation and Reverse-Engineering (from assembly into C)
☆73Updated 3 years ago
Alternatives and similar repositories for OverRide:
Users that are interested in OverRide are comparing it to the libraries listed below
- ☆72Updated last year
- ☆124Updated 2 years ago
- Cisco ASA Software and ASDM Security Research☆81Updated 2 years ago
- LPE for CVE-2020-1054 targeting Windows 7 x64☆86Updated 4 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 3 years ago
- Presentations from the CX Security Labs team☆33Updated 5 months ago
- PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github☆61Updated 4 years ago
- ☆130Updated 2 years ago
- ☆115Updated last year
- Linux Kernel module-less implant (backdoor)☆72Updated 4 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Updated 4 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆121Updated 4 years ago
- Linux x86_64 Process Injection Utility☆59Updated 4 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆128Updated 2 years ago
- lpe poc for cve-2022-21882☆49Updated 3 years ago
- PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)☆124Updated 4 years ago
- ☆52Updated 3 years ago
- ☆76Updated last month
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆101Updated 2 years ago
- PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.☆74Updated 2 years ago
- ☆48Updated 4 years ago
- Proof-of-concept code for various bugs☆108Updated 5 months ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆122Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆91Updated 3 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆87Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆65Updated last year
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- ☆21Updated 4 years ago
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆143Updated 3 years ago