Google Chrome Use After Free
☆61May 23, 2022Updated 3 years ago
Alternatives and similar repositories for WizardOpium
Users that are interested in WizardOpium are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf☆60Apr 25, 2019Updated 6 years ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆38Oct 21, 2020Updated 5 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆21Aug 9, 2022Updated 3 years ago
- ☆28Feb 6, 2024Updated 2 years ago
- A PoC tool for exploiting leaked process and thread handles☆32Feb 13, 2024Updated 2 years ago
- ☆19Jan 31, 2023Updated 3 years ago
- C# wrapper for ligolo☆17Dec 9, 2021Updated 4 years ago
- ☆34Apr 14, 2025Updated 11 months ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆96Dec 20, 2021Updated 4 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Jul 7, 2020Updated 5 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆151Mar 2, 2023Updated 3 years ago
- Hyper-V Fuzzer using hAFL2☆11May 10, 2022Updated 3 years ago
- ☆17Oct 31, 2022Updated 3 years ago
- Corsair LL Access driver abuse☆24Apr 16, 2021Updated 4 years ago
- ☆22Jul 10, 2020Updated 5 years ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- A WinDbg extension to trace COM interactions☆131Aug 14, 2025Updated 7 months ago
- ☆14Jun 21, 2020Updated 5 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆214Jul 2, 2020Updated 5 years ago
- Spoof parent process ID☆13Jan 23, 2019Updated 7 years ago
- Research related☆89Apr 5, 2022Updated 3 years ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Dec 24, 2022Updated 3 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆122Jul 21, 2022Updated 3 years ago
- Dell Driver EoP (CVE-2021-21551)☆32Feb 24, 2022Updated 4 years ago
- ☆64Aug 15, 2023Updated 2 years ago
- NT AUTHORITY\SYSTEM☆44Jul 8, 2020Updated 5 years ago
- ☆36Jun 14, 2021Updated 4 years ago
- ☆14May 20, 2019Updated 6 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆260Sep 1, 2022Updated 3 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Jun 26, 2021Updated 4 years ago
- ☆30Jul 18, 2025Updated 8 months ago
- A tool for Windows that can make any program work within file-system transactions.☆59Nov 12, 2020Updated 5 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- C++ WinRM API via Reflective DLL☆145Sep 11, 2021Updated 4 years ago
- Super IOCTL Basic Fuzzer☆16Sep 22, 2019Updated 6 years ago
- Recursive MMIO VM Escape PoC☆171May 13, 2022Updated 3 years ago