ic3qu33n / OffensiveCon24-uefi-task-of-the-translator
OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"
☆42Updated 11 months ago
Alternatives and similar repositories for OffensiveCon24-uefi-task-of-the-translator:
Users that are interested in OffensiveCon24-uefi-task-of-the-translator are comparing it to the libraries listed below
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 2 months ago
- CVE-2024-30090 - LPE PoC☆106Updated 6 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated 3 weeks ago
- Proof-of-Concept for CVE-2024-26218☆51Updated 11 months ago
- BINARLY Research Tools and PoCs☆36Updated 6 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆73Updated 3 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated 10 months ago
- Windows KASLR bypass using prefetch side-channel☆89Updated last year
- ☆42Updated 3 weeks ago
- ☆18Updated last month
- Analysis of the vulnerability☆51Updated last year
- ☆59Updated last year
- V8sandbox_bypass using stack misalignment☆19Updated 8 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- Rule Engine for Dynamic Malware Analysis and Research☆23Updated last week
- A more reliable way of resolving syscall numbers in Windows☆49Updated last year
- ☆29Updated last month
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆98Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 4 months ago
- ☆105Updated 5 months ago
- ☆34Updated 10 months ago
- ☆28Updated 2 months ago
- ☆32Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆55Updated 4 months ago
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆25Updated 7 months ago
- A few examples of how to trap virtual memory access on Windows.☆29Updated 4 months ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆116Updated last week
- ☆35Updated last month
- ☆28Updated 11 months ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆129Updated last year