anyaschukin / OverRide
Binary Exploitation and Reverse-Engineering (from assembly into C)
☆73Updated 3 years ago
Alternatives and similar repositories for OverRide:
Users that are interested in OverRide are comparing it to the libraries listed below
- ☆72Updated last year
- ☆115Updated 9 months ago
- CVE-2022-0847☆49Updated 2 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- Cisco ASA Software and ASDM Security Research☆80Updated 2 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆121Updated 4 years ago
- ☆130Updated 2 years ago
- ☆46Updated 2 years ago
- ☆80Updated 3 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆64Updated 9 months ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆48Updated 4 years ago
- PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.☆74Updated 2 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆124Updated 2 years ago
- ☆49Updated 4 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆120Updated 3 years ago
- LPE for CVE-2020-1054 targeting Windows 7 x64☆86Updated 4 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆87Updated last year
- ☆73Updated 2 years ago
- PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)☆125Updated 4 years ago
- CVE-2020-1337 Windows Print Spooler Privilege Escalation☆152Updated last year
- ☆123Updated 2 years ago
- lpe poc for cve-2022-21882☆49Updated 2 years ago
- Full disclosures for CVE ids, proofs of concept, exploits, 0day bugs and so on.☆113Updated last year
- Small visualizator for PE files☆67Updated last year
- Critical Vulnerabilities in Trend Micro Deep Security Agent for Linux☆28Updated 3 years ago
- Slides and other material from various conference presentations.☆40Updated 3 years ago
- A series of writes about “Binary Exploitation”.☆86Updated last year