de7ec7ed / CVE-2016-0040Links
CVE-2016-0040 Privilege Escalation Exploit For WMI Receive Notification Vulnerability (x86-64)
☆14Updated 7 years ago
Alternatives and similar repositories for CVE-2016-0040
Users that are interested in CVE-2016-0040 are comparing it to the libraries listed below
Sorting:
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆62Updated 7 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆31Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- ☆34Updated 7 years ago
- ☆35Updated 9 years ago
- ☆22Updated 7 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- ☆34Updated 7 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Python script to inject and run shellcodes through TLS callbacks☆49Updated 10 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆81Updated 8 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow with Stack Cookie Bypass Exploit☆18Updated 8 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- UAC 0Day all day!☆57Updated 7 years ago
- BlazeFox Exploit☆18Updated 6 years ago
- ☆44Updated 6 years ago
- ☆51Updated 8 years ago
- black hat Asia 2017 Slides☆22Updated 8 years ago
- fragments of dirty, and quick code. possible error checking or none.☆24Updated 8 years ago
- Automatically exported from code.google.com/p/ioctlbf☆16Updated 10 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- ☆39Updated 4 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Updated 8 years ago
- A fuzz job for ClamAV☆31Updated 9 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Updated 11 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 8 years ago
- Using SEH to bypass CFG☆29Updated 8 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago
- ☆22Updated 8 years ago