ic3qu33n / OffensiveCon24-uefi-task-of-the-translatorLinks
OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"
☆42Updated last year
Alternatives and similar repositories for OffensiveCon24-uefi-task-of-the-translator
Users that are interested in OffensiveCon24-uefi-task-of-the-translator are comparing it to the libraries listed below
Sorting:
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 7 months ago
- CVE-2024-30090 - LPE PoC☆108Updated 11 months ago
- BINARLY Research Tools and PoCs☆37Updated last year
- Binary Exploitation Phrack CTF Challenge☆133Updated last month
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 2 months ago
- ☆50Updated 6 months ago
- Analysis of the vulnerability☆51Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 9 months ago
- rpv-web is a browser based frontend for the rpv library☆26Updated 4 months ago
- ☆82Updated last month
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆144Updated last year
- Proof-of-Concept for CVE-2024-26218☆54Updated last year
- ☆36Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- Report and exploit of CVE-2023-36427☆88Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- ☆38Updated 9 months ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆159Updated last week
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆47Updated 6 months ago
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- Windows Win32 Kernel Subsystem☆30Updated last month
- ☆32Updated 7 months ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- Rule Engine for Dynamic Malware Analysis and Research☆25Updated 5 months ago
- Userland exec PoC to be used as attack vector technique☆88Updated 3 weeks ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆50Updated 4 months ago
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆48Updated 3 weeks ago
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆83Updated 2 weeks ago
- A few examples of how to trap virtual memory access on Windows.☆34Updated 9 months ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆35Updated 2 weeks ago