forrest-orr / WizardOpiumLinks
Google Chrome Use After Free
☆59Updated 3 years ago
Alternatives and similar repositories for WizardOpium
Users that are interested in WizardOpium are comparing it to the libraries listed below
Sorting:
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 3 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Winbindex bot to pull in binaries for specific releases☆48Updated 2 years ago
- ☆48Updated 5 years ago
- CVE-2018-6066 using VBA☆67Updated 3 years ago
- Inter-Process Communication Mechanisms☆28Updated 5 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆56Updated 3 years ago
- ☆20Updated 2 years ago
- Extract data of TTD trace file to a minidump☆30Updated 2 years ago
- Slide of my conference presentations☆14Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49Updated last year
- ☆29Updated last month
- ☆13Updated last year
- ☆74Updated last year
- ☆72Updated last year
- A collection of various exploits☆29Updated last year
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- ☆18Updated 5 years ago
- Report and exploit of CVE-2023-36427☆88Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 10 months ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated 2 years ago
- ☆12Updated 2 years ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆37Updated 2 months ago
- Slides from various conference talks☆37Updated 2 years ago
- A few examples of how to trap virtual memory access on Windows.☆34Updated 10 months ago
- Finds imports that could be exploited, still requires manual analysis.☆29Updated 2 years ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- ☆64Updated last year
- Small visualizator for PE files☆70Updated 2 years ago