eset / vulnerability-disclosures
Repository of vulnerabilities disclosed by ESET
☆28Updated 2 years ago
Alternatives and similar repositories for vulnerability-disclosures:
Users that are interested in vulnerability-disclosures are comparing it to the libraries listed below
- ☆28Updated 5 months ago
- SPI flash read MitM attack PoC☆37Updated 2 years ago
- Slides from various conference talks☆36Updated last year
- Extract data of TTD trace file to a minidump☆28Updated last year
- ☆12Updated 6 months ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆19Updated 2 years ago
- An IDA plugin to deal with Event Tracing for Windows (ETW)☆53Updated 2 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆20Updated 5 years ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆24Updated last year
- Command like tool to print mitigation flags for running processes in a memory dump☆46Updated 4 years ago
- ☆14Updated 3 years ago
- Example for PagedOut!☆24Updated 5 years ago
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆38Updated 3 years ago
- ☆11Updated 2 years ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- Local OXID Resolver (LCLOR) : Research and Tooling☆35Updated 3 years ago
- Windows kernel PDB data parsed into YAML☆36Updated 5 months ago
- Winbindex bot to pull in binaries for specific releases☆47Updated last year
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- ☆33Updated 3 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 4 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- A Practical example of ELAM (Early Launch Anti-Malware)☆32Updated 3 years ago
- ☆16Updated 2 years ago
- PoC code and tools for Black Hat USA 2024☆21Updated 8 months ago
- ☆31Updated 4 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆60Updated 8 months ago
- A few examples of how to trap virtual memory access on Windows.☆29Updated 4 months ago
- Progress of learning kernel development☆14Updated 2 years ago