Talk and materials for Offensive Con presentation - Privileged Helper Tools
☆47Feb 15, 2019Updated 7 years ago
Alternatives and similar repositories for Offensive-Con
Users that are interested in Offensive-Con are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- 3D Accelerated Exploitation☆54Feb 22, 2019Updated 7 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆91Feb 15, 2019Updated 7 years ago
- Array.prototype.slice wrong alias information.☆68Mar 25, 2019Updated 7 years ago
- Source code and exploits for some 35c3ctf challenges.☆143Dec 30, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Proof of Concept of TrustZone exploit☆16Aug 10, 2025Updated 8 months ago
- Flare-On solutions☆37Oct 11, 2019Updated 6 years ago
- Misc PoCs for various research topics☆21Sep 28, 2022Updated 3 years ago
- Binfuzz.js: A Binary Fuzzer in JavaScript☆30Aug 1, 2013Updated 12 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- Kernel driver to fuzz Hyper-V hypercalls☆136Feb 15, 2019Updated 7 years ago
- FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking☆17Apr 1, 2018Updated 8 years ago
- ☆26Jul 8, 2015Updated 10 years ago
- List of Red Team Repositories☆17Feb 26, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A fork of AFL for fuzzing Windows binaries☆54Dec 31, 2018Updated 7 years ago
- exploit for CVE-2018-4193☆69Feb 13, 2019Updated 7 years ago
- ☆286Apr 23, 2020Updated 5 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆15May 8, 2019Updated 6 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Feb 24, 2019Updated 7 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Aug 17, 2017Updated 8 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Apr 18, 2019Updated 6 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 8 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆97Aug 22, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- TyphoonCon 2019☆53Aug 8, 2019Updated 6 years ago
- A minimal safe version of mimikatz to only allow the export of non-exportable Windows certificates☆26Sep 23, 2018Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Nov 26, 2016Updated 9 years ago
- Research into Apple PPP and CCL components☆19Jun 8, 2019Updated 6 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Feb 2, 2018Updated 8 years ago
- An XPC Wrapper for OS X☆15May 29, 2019Updated 6 years ago
- Solutions for my 34C3CTF challenges☆21Jul 9, 2018Updated 7 years ago
- An extra light, extra simple Objective-C hooking framework☆16Jun 18, 2025Updated 9 months ago
- Chrome v8 1Day Exploit by István Kurucsai☆170Apr 3, 2019Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- Exploiting a patched vulnerability in JavaScriptCore☆17Jan 2, 2020Updated 6 years ago
- Automatically generate ASM.JS JIT-Spray payloads☆36Mar 14, 2018Updated 8 years ago
- ☆15Oct 31, 2022Updated 3 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Oct 17, 2017Updated 8 years ago
- Writeups and solutions for RC3CTF 2016☆14Nov 23, 2016Updated 9 years ago
- MikroTik RouterOS Winbox未经身份验证的任意文件读/写漏洞☆30Dec 16, 2018Updated 7 years ago