k0keoyo / Dark_Composition_case_study_Integer_Overflow
☆33Updated this week
Related projects: ⓘ
- Slides of 44Con 2018☆21Updated 5 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆25Updated 7 years ago
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Updated 5 years ago
- ☆46Updated 7 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 7 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Updated 6 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆53Updated 7 years ago
- My conference presentations and publications☆26Updated 2 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 5 years ago
- ☆33Updated last year
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 6 years ago
- ☆31Updated 6 years ago
- ☆44Updated 4 years ago
- ASLR bypass in Chrome version 77☆23Updated 4 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆36Updated 5 years ago
- Public repository for HEVD exploits☆20Updated 6 years ago
- prebuild angr wheels for Windows on x86_64☆13Updated 6 years ago
- ☆34Updated this week
- A Fuzzer for Windows NDIS Drivers OID Handlers☆91Updated 2 years ago
- PoC for CVE-2017-0075☆36Updated 5 years ago
- Windows syscall fuzzer that I used in 2017 & 2018. Not much to say about it but maybe helpful to someone. At least syscall information it…☆19Updated 4 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆34Updated 6 years ago
- ☆35Updated 6 years ago
- Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques☆53Updated 6 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆30Updated 5 years ago
- ☆62Updated 7 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆21Updated 7 years ago
- Using SEH to bypass CFG☆28Updated 7 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 5 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆25Updated 11 years ago