ic3qu33n / OffensiveCon24-uefi-task-of-the-translatorLinks
OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"
☆43Updated last year
Alternatives and similar repositories for OffensiveCon24-uefi-task-of-the-translator
Users that are interested in OffensiveCon24-uefi-task-of-the-translator are comparing it to the libraries listed below
Sorting:
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 8 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 10 months ago
- BINARLY Research Tools and PoCs☆38Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 3 months ago
- CVE-2024-30090 - LPE PoC☆108Updated last year
- ☆51Updated 7 months ago
- ☆39Updated 11 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- Binary Exploitation Phrack CTF Challenge☆136Updated 2 months ago
- ☆83Updated 3 months ago
- Proof-of-Concept for CVE-2024-26218☆54Updated last year
- Analysis of the vulnerability☆51Updated last year
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆37Updated 2 months ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆53Updated 5 months ago
- ☆31Updated 8 months ago
- Rule Engine for Dynamic Malware Analysis and Research☆25Updated 7 months ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆146Updated last year
- ☆37Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- V8sandbox_bypass using stack misalignment☆23Updated last year
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 8 months ago
- Windows Win32 Kernel Subsystem☆32Updated 2 months ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 11 months ago
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆122Updated this week
- A few examples of how to trap virtual memory access on Windows.☆35Updated 10 months ago
- ☆74Updated last year
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆42Updated last month
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49Updated last year
- ☆48Updated 3 months ago