☆25Mar 18, 2018Updated 8 years ago
Alternatives and similar repositories for QEMU_ESCAPE
Users that are interested in QEMU_ESCAPE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- vm escape exploit☆39Sep 24, 2017Updated 8 years ago
- PoCs for VMWare VGPU Direct 3D 10 vulnerabilities fixed in VMware Workstation 12.5.5 and 12.5.7☆36Jul 17, 2017Updated 8 years ago
- 2019 Advent Calendar, vmware pwnables☆50Jul 21, 2020Updated 5 years ago
- ☆27Mar 16, 2023Updated 3 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- ☆68Mar 15, 2024Updated 2 years ago
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆17Oct 19, 2020Updated 5 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- ☆17Dec 30, 2020Updated 5 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- My KVM breakout code from my DEFCON/Black Hat 2011 presentation☆35Apr 9, 2014Updated 12 years ago
- VMI on BitVisor to detect hidden rootkits.☆27Dec 19, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Networking exploration in golang to build a security enhanced version of netcat☆10Feb 20, 2018Updated 8 years ago
- ☆15May 23, 2019Updated 6 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- Some stuffs for CODE BLUE 2016☆23Oct 26, 2016Updated 9 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆147Jan 23, 2021Updated 5 years ago
- Underconstrained symbolic execution for cryptography verification☆19Mar 26, 2021Updated 5 years ago
- A Binary Ninja plugin for importing IDC database dumps from IDA.☆41Oct 13, 2022Updated 3 years ago
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.☆10Dec 20, 2018Updated 7 years ago
- 作为博客☆11Apr 30, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆100Aug 28, 2018Updated 7 years ago
- x86 Dynamic Binary Translator Library☆33Dec 19, 2020Updated 5 years ago
- VirtualBox 3D exploits & PoCs☆163Jan 24, 2019Updated 7 years ago
- ☆286Apr 23, 2020Updated 5 years ago
- ☆22May 25, 2017Updated 8 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 4 years ago
- Vulnerability analyze☆17Sep 21, 2020Updated 5 years ago
- Yet another CTF Platform☆22May 24, 2016Updated 9 years ago
- Slides from my conference presentations.☆80Aug 5, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- Retro Game Engine inspired by the SNES-era☆25Sep 15, 2022Updated 3 years ago
- Cream of the Crop Pwning Challenges☆32Feb 1, 2020Updated 6 years ago
- My personal website.☆12Feb 24, 2023Updated 3 years ago
- ☆40Dec 29, 2017Updated 8 years ago
- 35C3 Slides☆23Dec 29, 2018Updated 7 years ago
- ☆30Dec 4, 2018Updated 7 years ago