jvazquez-r7 / ht_win32k_info_leakLinks
☆10Updated 9 years ago
Alternatives and similar repositories for ht_win32k_info_leak
Users that are interested in ht_win32k_info_leak are comparing it to the libraries listed below
Sorting:
- ☆15Updated 10 years ago
- Slides & Video Demos of My Talk Titled Browser Exploits? Grab ’em by the Collar! @ Brucon0x09☆1Updated 7 years ago
- liberty writeup defcon 2017☆10Updated 8 years ago
- Shellcode tracer☆15Updated 9 years ago
- Internet Explorer MemoryProtection Mitigation☆32Updated 10 years ago
- Стафф для статьи «Stuxnet своими руками». И никакой малвари! ;)☆6Updated 11 years ago
- A fuzzer for HTML5 canvas operations.☆10Updated 7 years ago
- ☆28Updated 8 years ago
- ☆22Updated 8 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Updated 9 years ago
- UAC Copy Tool☆9Updated 9 years ago
- ☆13Updated 9 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Updated 13 years ago
- ☆12Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆14Updated 8 years ago
- CVE-2014-0816☆25Updated 8 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Updated 10 years ago
- ☆10Updated 7 years ago
- The tool for bugs detection in the process of tainted data processing (based on DBI Intel PIN).☆12Updated 9 years ago
- Private set of tools for game hacking☆12Updated 10 years ago
- Expression generator for WebAssembly☆18Updated 7 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- HeapsAboutCorruption - set of implementation / demonstration public heap specific exploit techniques, enjoy!☆13Updated 11 years ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Updated 11 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Updated 7 years ago
- Flash Exploit Detector☆7Updated 9 years ago
- ☆19Updated 11 years ago
- Architecture-agnostic ROP gadget finder using JEB's IR☆22Updated 7 years ago
- Using SEH to bypass CFG☆29Updated 8 years ago
- black hat Asia 2017 Slides☆22Updated 8 years ago