badd1e / ExploitsLinks
Advanced exploits that I wrote for Pwn2Own competitions and other occasions
☆169Updated last year
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below
Sorting:
- An automatic Blind ROP exploitation tool☆207Updated 2 years ago
- ASLR bypass without infoleak☆166Updated 4 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆146Updated 3 years ago
- Leveraging patch diffing to discover new vulnerabilities☆138Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆217Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆46Updated 3 years ago
- ☆55Updated 7 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆63Updated 2 years ago
- ☆130Updated last year
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆123Updated 3 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 11 months ago
- ☆215Updated last year
- ☆207Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 5 months ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Updated last year
- ☆179Updated 2 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆235Updated 2 years ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆164Updated last month
- Binary Exploitation Phrack CTF Challenge☆140Updated 5 months ago
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆263Updated 4 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆84Updated 5 months ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆110Updated 3 years ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆170Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Updated last year
- ☆131Updated 2 years ago
- Some of my windows kernel exploits for learning purposes☆135Updated 3 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆126Updated 2 months ago