ic3qu33n / OffensiveCon24-uefi-task-of-the-translatorLinks
OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"
☆42Updated last year
Alternatives and similar repositories for OffensiveCon24-uefi-task-of-the-translator
Users that are interested in OffensiveCon24-uefi-task-of-the-translator are comparing it to the libraries listed below
Sorting:
- Aplos an extremely simple fuzzer for Windows binaries.☆67Updated 8 months ago
- CVE-2024-30090 - LPE PoC☆108Updated last year
- BINARLY Research Tools and PoCs☆38Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 9 months ago
- ☆50Updated 7 months ago
- ☆39Updated 10 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- Binary Exploitation Phrack CTF Challenge☆134Updated 2 months ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆146Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 2 months ago
- rpv-web is a browser based frontend for the rpv library☆25Updated 5 months ago
- A few examples of how to trap virtual memory access on Windows.☆34Updated 10 months ago
- Analysis of the vulnerability☆51Updated last year
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆126Updated 6 months ago
- ☆32Updated 7 months ago
- ☆36Updated last year
- ☆105Updated last year
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆79Updated 2 months ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆158Updated last month
- ☆83Updated 2 months ago
- ☆108Updated 11 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 8 months ago
- PoC code of Shade BIOS (stripped) presented at Black Hat USA 2025☆59Updated 3 months ago
- Proof-of-Concept for CVE-2024-26218☆54Updated last year
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆51Updated 4 months ago
- Userland exec PoC to be used as attack vector technique☆93Updated last month
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆48Updated last month
- ☆63Updated last year