☆42May 10, 2016Updated 9 years ago
Alternatives and similar repositories for CVE-2016-0051
Users that are interested in CVE-2016-0051 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆323May 9, 2016Updated 9 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆10Aug 13, 2015Updated 10 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- Lists work items being queued currently.☆15Jun 7, 2015Updated 10 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- Windows kernel vulnerability in win32k.sys Driver☆35Dec 6, 2015Updated 10 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- ☆17Mar 3, 2016Updated 10 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A sample project for using Capstone from a driver in Visual Studio 2015☆37May 4, 2016Updated 9 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆41Jul 25, 2014Updated 11 years ago
- ☆30May 23, 2017Updated 8 years ago
- ☆10Mar 30, 2016Updated 9 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Collect some PoC that I writted .记录自己写过的PoC ..☆22Dec 20, 2017Updated 8 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆114Jun 23, 2016Updated 9 years ago
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 10 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- A remote desktop control suite☆16Jun 28, 2014Updated 11 years ago
- Examine, a memory leak checker on Windows☆13Jun 4, 2016Updated 9 years ago
- Windows设备驱动开发 光盘(示例代码)☆10Jan 14, 2013Updated 13 years ago
- Local Kernel Debugger (LKD) is a python wrapper around dbgengine.dll☆92Aug 22, 2016Updated 9 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- My Shellcode Archive☆29Mar 21, 2017Updated 9 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- WinEoP Exploitation Framework☆25Jan 7, 2016Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆13Jun 13, 2017Updated 8 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- Minifilter Driver☆15Feb 10, 2017Updated 9 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 10 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago