Repository of vulnerabilities disclosed by ESET
☆29Jul 13, 2022Updated 3 years ago
Alternatives and similar repositories for vulnerability-disclosures
Users that are interested in vulnerability-disclosures are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Jul 25, 2023Updated 2 years ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- lojax_uefi_rootkit_checker☆19Nov 18, 2018Updated 7 years ago
- CVE-2017-5721 Proof-of-Concept☆17Oct 23, 2017Updated 8 years ago
- Checks for tpm vulnerabilities☆38Mar 16, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tool to dump EFI runtime drivers.☆39Feb 23, 2024Updated 2 years ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 3 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆57Nov 16, 2021Updated 4 years ago
- Hex Calculator for Windows☆13Dec 2, 2016Updated 9 years ago
- ☆14Jun 21, 2020Updated 5 years ago
- ☆90Oct 17, 2020Updated 5 years ago
- PoC code and tools for Black Hat USA 2024☆24Aug 1, 2024Updated last year
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆147Mar 29, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆19Mar 17, 2025Updated last year
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- Process hunting Toolkit is toolkit capable of hunting down malicious processes on Windows☆14Jan 31, 2025Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆41May 22, 2024Updated last year
- ☆14Jul 12, 2024Updated last year
- Corsair LL Access driver abuse☆24Apr 16, 2021Updated 4 years ago
- This is an instruction to run your own SMM code.☆109Mar 8, 2021Updated 5 years ago
- Iterate over Windows Handles☆15Nov 18, 2025Updated 4 months ago
- The source code produces TWO different AMIBIOS 1B module utilities, ami_1b_splitter and ami_1b_combiner. The utilities produced by the so…☆36Jul 13, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- NT AUTHORITY\SYSTEM☆44Jul 8, 2020Updated 5 years ago
- ☆24Aug 27, 2021Updated 4 years ago
- ☆61Aug 21, 2023Updated 2 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆22Aug 9, 2022Updated 3 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆77Oct 22, 2016Updated 9 years ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆243Mar 12, 2024Updated 2 years ago
- PC firmware exploitation tool and library☆260May 13, 2022Updated 3 years ago
- Control-flow-flattening and string deobfuscator☆160Nov 8, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Binarly Vulnerability Research Advisories☆183Mar 25, 2026Updated 2 weeks ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆97Dec 20, 2021Updated 4 years ago
- reverse engineering of the windows nt kernel debugger protocol & reimplementation.☆38Jul 2, 2024Updated last year
- post exploitation user monitoring tool☆20Jul 3, 2018Updated 7 years ago
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- Ghosting-AMSI☆18Apr 30, 2025Updated 11 months ago
- A Binary Ninja plugin that automatically resolves type information for EFI protocol usage.☆36Jul 25, 2025Updated 8 months ago