Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)
☆27Aug 6, 2023Updated 2 years ago
Alternatives and similar repositories for papers
Users that are interested in papers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆36Nov 15, 2024Updated last year
- Hyper-V sockets☆29Sep 11, 2017Updated 8 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆189Jun 24, 2019Updated 6 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Oct 5, 2016Updated 9 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆111Dec 11, 2019Updated 6 years ago
- Figuring out the cause of a handle downgrade☆24Dec 13, 2022Updated 3 years ago
- Collection of (at time of release) iOS bugs I found☆56Jan 28, 2020Updated 6 years ago
- The official repository of the Hex-Rays IDA Pro vulnerability scanner plugin.☆20Apr 30, 2013Updated 12 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- Interpreter for inference rules☆13May 5, 2018Updated 7 years ago
- ☆90Oct 17, 2020Updated 5 years ago
- ☆121Apr 1, 2018Updated 7 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- ☆24Aug 27, 2021Updated 4 years ago
- ☆31Jul 27, 2020Updated 5 years ago
- 收录go语言编写的项目、框架和组件出现的cve,或者一些相关的利用方式的文章☆47Nov 23, 2022Updated 3 years ago
- ☆38Jul 4, 2016Updated 9 years ago
- Valgrind extension for whitebox fuzz testing☆30Jul 10, 2009Updated 16 years ago
- Code of KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations (USENIX Security'23)☆92Aug 31, 2023Updated 2 years ago
- ☆12Dec 26, 2017Updated 8 years ago
- hook msr by amd svm☆125Dec 30, 2019Updated 6 years ago
- UAC Bypass with mmc via alpc☆158Apr 5, 2019Updated 6 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Jul 1, 2017Updated 8 years ago
- source code and binaries related to my trainings☆20Oct 18, 2016Updated 9 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Jan 7, 2020Updated 6 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago
- ☆12Aug 2, 2017Updated 8 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- Exploration of primes, factorization and number theory through haskell☆10Oct 10, 2016Updated 9 years ago
- MacOS X process monitor using EndpointSecurity extension.☆37Sep 29, 2025Updated 5 months ago