forrest-orr / WizardOpiumLinks
Google Chrome Use After Free
☆57Updated 3 years ago
Alternatives and similar repositories for WizardOpium
Users that are interested in WizardOpium are comparing it to the libraries listed below
Sorting:
- Winbindex bot to pull in binaries for specific releases☆48Updated last year
- ☆19Updated 2 years ago
- ☆48Updated 4 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆119Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- Inter-Process Communication Mechanisms☆28Updated 4 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated last year
- Slide of my conference presentations☆14Updated 9 months ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 3 years ago
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆48Updated last year
- Local OXID Resolver (LCLOR) : Research and Tooling☆35Updated 4 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆89Updated 3 years ago
- ☆72Updated last year
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- Small visualizator for PE files☆69Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 6 months ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆98Updated 4 years ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆62Updated 2 years ago
- Finds imports that could be exploited, still requires manual analysis.☆27Updated 2 years ago
- ☆12Updated 8 months ago
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- CVE-2018-6066 using VBA☆64Updated 2 years ago
- ☆48Updated 3 months ago
- a PE Loader and Windows API tracer. Useful in malware analysis.☆139Updated 2 years ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆116Updated last year
- A few examples of how to trap virtual memory access on Windows.☆31Updated 6 months ago
- Recon 2023 slides and code☆79Updated 2 years ago
- ☆14Updated 3 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Helper idapython code for reversing kmdf drivers☆72Updated 2 years ago