forrest-orr / WizardOpium
Google Chrome Use After Free
☆55Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for WizardOpium
- Winbindex bot to pull in binaries for specific releases☆46Updated last year
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- ☆49Updated 4 years ago
- Inter-Process Communication Mechanisms☆24Updated 4 years ago
- ☆18Updated last year
- Enabled / Disable LSA Protection via BYOVD☆62Updated 2 years ago
- Small visualizator for PE files☆67Updated last year
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆85Updated 2 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Here are some of my malware reversing papers that I will be publishing☆31Updated 2 years ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆112Updated 6 months ago
- ☆16Updated 4 years ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆30Updated last year
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆12Updated last year
- Local OXID Resolver (LCLOR) : Research and Tooling☆33Updated 3 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆94Updated 4 years ago
- TrashDBG the world's worse debugger☆24Updated 2 years ago
- Slides from various conference talks☆36Updated last year
- ☆34Updated last month
- Slide of my conference presentations☆11Updated 2 months ago
- An Xdbg Plugin of the ERC Library.☆26Updated 9 months ago
- Command like tool to print mitigation flags for running processes in a memory dump☆44Updated 4 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 3 years ago
- ☆59Updated 4 months ago
- ☆26Updated 3 weeks ago
- A Poc on blocking Procmon from monitoring network events☆98Updated 2 years ago
- ☆71Updated last year