☆25Mar 18, 2018Updated 8 years ago
Alternatives and similar repositories for QEMU_ESCAPE
Users that are interested in QEMU_ESCAPE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- vm escape exploit☆39Sep 24, 2017Updated 8 years ago
- PoCs for VMWare VGPU Direct 3D 10 vulnerabilities fixed in VMware Workstation 12.5.5 and 12.5.7☆36Jul 17, 2017Updated 8 years ago
- 2019 Advent Calendar, vmware pwnables☆50Jul 21, 2020Updated 5 years ago
- ☆27Mar 16, 2023Updated 3 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- ☆68Mar 15, 2024Updated 2 years ago
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆17Oct 19, 2020Updated 5 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- ☆17Dec 30, 2020Updated 5 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- My KVM breakout code from my DEFCON/Black Hat 2011 presentation☆35Apr 9, 2014Updated 11 years ago
- VMI on BitVisor to detect hidden rootkits.☆27Dec 19, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Networking exploration in golang to build a security enhanced version of netcat☆10Feb 20, 2018Updated 8 years ago
- ☆15May 23, 2019Updated 6 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- Some stuffs for CODE BLUE 2016☆23Oct 26, 2016Updated 9 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆147Jan 23, 2021Updated 5 years ago
- Underconstrained symbolic execution for cryptography verification☆19Mar 26, 2021Updated 5 years ago
- A Binary Ninja plugin for importing IDC database dumps from IDA.☆41Oct 13, 2022Updated 3 years ago
- 作为博客☆11Apr 30, 2020Updated 5 years ago
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.☆10Dec 20, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆100Aug 28, 2018Updated 7 years ago
- x86 Dynamic Binary Translator Library☆33Dec 19, 2020Updated 5 years ago
- VirtualBox 3D exploits & PoCs☆163Jan 24, 2019Updated 7 years ago
- ☆287Apr 23, 2020Updated 5 years ago
- ☆22May 25, 2017Updated 8 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 3 years ago
- Vulnerability analyze☆17Sep 21, 2020Updated 5 years ago
- Yet another CTF Platform☆22May 24, 2016Updated 9 years ago
- Slides from my conference presentations.☆80Aug 5, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Retro Game Engine inspired by the SNES-era☆25Sep 15, 2022Updated 3 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- Cream of the Crop Pwning Challenges☆32Feb 1, 2020Updated 6 years ago
- My personal website.☆12Feb 24, 2023Updated 3 years ago
- ☆40Dec 29, 2017Updated 8 years ago
- 35C3 Slides☆23Dec 29, 2018Updated 7 years ago
- ☆30Dec 4, 2018Updated 7 years ago