Talk and materials for Offensive Con presentation - Privileged Helper Tools
☆47Feb 15, 2019Updated 7 years ago
Alternatives and similar repositories for Offensive-Con
Users that are interested in Offensive-Con are comparing it to the libraries listed below
Sorting:
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- 3D Accelerated Exploitation☆54Feb 22, 2019Updated 7 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆91Feb 15, 2019Updated 7 years ago
- Array.prototype.slice wrong alias information.☆68Mar 25, 2019Updated 6 years ago
- Source code and exploits for some 35c3ctf challenges.☆143Dec 30, 2018Updated 7 years ago
- Proof of Concept of TrustZone exploit☆16Aug 10, 2025Updated 7 months ago
- Flare-On solutions☆37Oct 11, 2019Updated 6 years ago
- Misc PoCs for various research topics☆21Sep 28, 2022Updated 3 years ago
- Binfuzz.js: A Binary Fuzzer in JavaScript☆30Aug 1, 2013Updated 12 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- Kernel driver to fuzz Hyper-V hypercalls☆136Feb 15, 2019Updated 7 years ago
- FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking☆17Apr 1, 2018Updated 7 years ago
- ☆26Jul 8, 2015Updated 10 years ago
- List of Red Team Repositories☆17Feb 26, 2019Updated 7 years ago
- A fork of AFL for fuzzing Windows binaries☆54Dec 31, 2018Updated 7 years ago
- exploit for CVE-2018-4193☆69Feb 13, 2019Updated 7 years ago
- ☆287Apr 23, 2020Updated 5 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Feb 24, 2019Updated 7 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆12Aug 17, 2017Updated 8 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Apr 18, 2019Updated 6 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 8 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆97Aug 22, 2018Updated 7 years ago
- TyphoonCon 2019☆53Aug 8, 2019Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Nov 26, 2016Updated 9 years ago
- Research into Apple PPP and CCL components☆19Jun 8, 2019Updated 6 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Feb 2, 2018Updated 8 years ago
- An XPC Wrapper for OS X☆15May 29, 2019Updated 6 years ago
- Solutions for my 34C3CTF challenges☆21Jul 9, 2018Updated 7 years ago
- An extra light, extra simple Objective-C hooking framework☆16Jun 18, 2025Updated 9 months ago
- Chrome v8 1Day Exploit by István Kurucsai☆170Apr 3, 2019Updated 6 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- Exploiting a patched vulnerability in JavaScriptCore☆17Jan 2, 2020Updated 6 years ago
- Automatically generate ASM.JS JIT-Spray payloads☆36Mar 14, 2018Updated 8 years ago
- ☆15Oct 31, 2022Updated 3 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Oct 17, 2017Updated 8 years ago
- Writeups and solutions for RC3CTF 2016☆14Nov 23, 2016Updated 9 years ago
- MikroTik RouterOS Winbox未经身份验证的任意文件读/写漏洞☆30Dec 16, 2018Updated 7 years ago
- Monitor adapter, Fake DNS, Tunnel, and DHCP combined into one Windows Service☆12Apr 19, 2015Updated 10 years ago