binarly-io / ToolsAndPoCs
BINARLY Research Tools and PoCs
☆35Updated 5 months ago
Alternatives and similar repositories for ToolsAndPoCs:
Users that are interested in ToolsAndPoCs are comparing it to the libraries listed below
- PoC code and tools for Black Hat USA 2024☆17Updated 7 months ago
- ☆34Updated 9 months ago
- A collection of various exploits☆27Updated 5 months ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆44Updated 4 months ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆35Updated 2 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- One Bootloader to Load Them All - Research materials, Code , Etc.☆51Updated 2 years ago
- Proof-of-Concept for CVE-2024-26218☆49Updated 10 months ago
- A few examples of how to trap virtual memory access on Windows.☆27Updated 2 months ago
- ☆18Updated 2 months ago
- rpv-web is a browser based frontend for the rpv library☆24Updated 7 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated 9 months ago
- A MBR Fuzzer☆28Updated 11 months ago
- some sploits☆17Updated 5 months ago
- ☆23Updated last month
- ☆27Updated 9 months ago
- ☆29Updated 3 months ago
- ☆12Updated 2 years ago
- V8sandbox_bypass using stack misalignment☆18Updated 6 months ago
- Analysis of the vulnerability☆49Updated last year
- ☆18Updated last month
- Folder Or File Delete to Get System Shell on Current Session Desktop☆38Updated 2 months ago
- ☆32Updated last year
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆36Updated 4 months ago
- ☆11Updated 4 months ago
- ☆24Updated last year
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago