☆18May 18, 2018Updated 7 years ago
Alternatives and similar repositories for CAJViewer-LPE-Exploit
Users that are interested in CAJViewer-LPE-Exploit are comparing it to the libraries listed below
Sorting:
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 8 years ago
- Improvised json-based configurable Windows sandbox☆11Sep 29, 2020Updated 5 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- This project has been moved from a private repository☆26Jun 4, 2018Updated 7 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- A simple tool to help you capture Ioctls.☆20Aug 26, 2017Updated 8 years ago
- ☆14Feb 14, 2018Updated 8 years ago
- ☆164May 18, 2018Updated 7 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆119Apr 19, 2018Updated 7 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆13Jul 10, 2019Updated 6 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- A PoC for CVE-2018-7249☆15Apr 29, 2025Updated 10 months ago
- ☆100Aug 28, 2018Updated 7 years ago
- CVE-2019-0708 Exploit Tool☆18Jul 18, 2019Updated 6 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆60Jan 11, 2017Updated 9 years ago
- Diff tool for comparing export tables in PE images☆24Mar 4, 2020Updated 6 years ago
- This repository contains some details about abusing outlook.☆27Aug 17, 2018Updated 7 years ago
- 一些漏洞的环境/利用工具/分析☆10Jul 24, 2020Updated 5 years ago
- 告别意外通话☆18Jan 6, 2016Updated 10 years ago
- A debugger in Python for Cisco c3560☆10Apr 24, 2018Updated 7 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- My research environment based off of Microsoft's Singularity RDK/ Verve.☆16Nov 27, 2016Updated 9 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- WIP - Play with Intel VM Extensions☆23Jun 12, 2017Updated 8 years ago
- couchdb remote command exec.☆14Mar 27, 2018Updated 7 years ago
- ☆15Jun 12, 2015Updated 10 years ago
- Hidden module/dll detector for windows apps☆15May 21, 2017Updated 8 years ago
- ☆27May 27, 2017Updated 8 years ago
- 常用系统服务默认端口列表☆13Apr 25, 2017Updated 8 years ago
- Browser Fuzzing with Machine Learning☆22Mar 6, 2019Updated 7 years ago
- ☆16Apr 24, 2019Updated 6 years ago
- ☆17Oct 25, 2018Updated 7 years ago
- ☆19Jul 20, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/guardlite☆11Jul 2, 2015Updated 10 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated 3 weeks ago
- Some python scripts are used to export userdata from huge idb(ida's database),ida 7.0 support only☆21Oct 18, 2018Updated 7 years ago
- dc2020 quals kernel pwn☆12May 18, 2020Updated 5 years ago