HitCon 2014 : IE 11 0day & Windows 8.1 Exploit
☆25Aug 25, 2014Updated 11 years ago
Alternatives and similar repositories for HitCon-2014-IE-11-0day-Windows-8.1-Exploit
Users that are interested in HitCon-2014-IE-11-0day-Windows-8.1-Exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows 8.1 + IE 11 Exploit☆18Jul 26, 2016Updated 9 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- HitCon 2015 spartan 0day & exploit☆27Sep 1, 2015Updated 10 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆10Aug 13, 2015Updated 10 years ago
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆108Jul 26, 2016Updated 9 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- ☆10Jul 10, 2015Updated 10 years ago
- CVE-2014-0816☆26Oct 5, 2016Updated 9 years ago
- Adobe Flash Player File Instrumentation Tool For Security Research☆86Sep 3, 2022Updated 3 years ago
- parses quicktime metadata☆12Oct 5, 2012Updated 13 years ago
- Windows Kernel Dump Analyzer☆15May 9, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆21Mar 24, 2015Updated 11 years ago
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- ☆60Feb 8, 2016Updated 10 years ago
- sebug.net上面的镜像☆63Apr 8, 2014Updated 11 years ago
- random RE stuff☆21May 11, 2012Updated 13 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Aug 21, 2014Updated 11 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- Multithreaded SQL union bruteforcer☆16Sep 9, 2011Updated 14 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Linux local root exploit for CVE-2014-0038☆199Apr 18, 2014Updated 11 years ago
- ☆19Mar 20, 2014Updated 12 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Slides, codes and videos of the talk "DEP/ASLR bypass without ROP/JIT" on CanSecWest 2013☆48Mar 20, 2013Updated 13 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- Telegram bot for assembling and disassembling on-the-go.☆21Sep 20, 2022Updated 3 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Flash ActionScript3 VM static analysis library based on Furnace framework.☆79May 30, 2013Updated 12 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- a C/C++ shellcode compiler based on llvm/clang☆39Mar 29, 2016Updated 10 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆16Jul 6, 2014Updated 11 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Yet Another SWF Parser☆33Mar 4, 2022Updated 4 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago