codewhitesec / UnmarshalPwn
POC for CVE-2018-0824
☆85Updated 2 years ago
Alternatives and similar repositories for UnmarshalPwn:
Users that are interested in UnmarshalPwn are comparing it to the libraries listed below
- EoP POC for CVE-2019-1132☆61Updated 5 years ago
- POC and exploitation of vulnerabilities☆92Updated 2 years ago
- Win32k Exploit by Grant Willcox☆88Updated 5 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆58Updated 5 years ago
- ☆49Updated 5 years ago
- cve-2018-8453 exp☆122Updated 5 years ago
- CVE-2019-0859 1day Exploit☆120Updated 4 years ago
- ☆128Updated 5 years ago
- cve-2019-0808-poc☆48Updated 5 years ago
- Synaptics Audio Driver LPE☆37Updated 5 years ago
- sploit☆68Updated 5 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Updated 5 years ago
- Slide deck for DefCon Beijing☆39Updated 6 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Updated 7 years ago
- Use Waitfor.exe to maintain persistence☆54Updated 3 years ago
- Security Research☆36Updated 3 years ago
- win32k use-after-free poc☆71Updated 4 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 7 years ago
- Aggressor Script to launch IE driveby for CVE-2018-4878☆87Updated 6 years ago
- PoC of CVE☆24Updated 4 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆14Updated 4 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- Use powershell to test Office-based persistence methods☆76Updated 3 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆109Updated 3 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆67Updated 5 years ago