Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)
☆27Aug 6, 2023Updated 2 years ago
Alternatives and similar repositories for papers
Users that are interested in papers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆37Nov 15, 2024Updated last year
- Hyper-V sockets☆29Sep 11, 2017Updated 8 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Shadow-Box: Lightweight and Practical Kernel Protector for x86 (Presented at BlackHat Asia 2017/2018, beVX 2018 and HITBSecConf 2017)☆191Jun 24, 2019Updated 6 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Oct 5, 2016Updated 9 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆112Dec 11, 2019Updated 6 years ago
- Figuring out the cause of a handle downgrade☆24Dec 13, 2022Updated 3 years ago
- Collection of (at time of release) iOS bugs I found☆56Jan 28, 2020Updated 6 years ago
- Kernel-Mode rootkit that connects to a remote server to send & recv commands☆33Sep 2, 2018Updated 7 years ago
- 3D Accelerated Exploitation☆54Feb 22, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The official repository of the Hex-Rays IDA Pro vulnerability scanner plugin.☆20Apr 30, 2013Updated 13 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- Proof of concept agentic solver for nfuncs from DEF CON Quals 2025☆23Apr 18, 2025Updated last year
- ☆90Oct 17, 2020Updated 5 years ago
- ☆121Apr 1, 2018Updated 8 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- ☆24Aug 27, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆31Jul 27, 2020Updated 5 years ago
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- 收录go语言编写的项目、框架和组件出现的cve,或者一些相关的利用方式的文章☆48Nov 23, 2022Updated 3 years ago
- ☆38Jul 4, 2016Updated 9 years ago
- 存放投稿里的一些文件☆11Oct 31, 2020Updated 5 years ago
- ☆12Dec 26, 2017Updated 8 years ago
- Generic exploit for master key vulnerability in Android☆34Feb 6, 2015Updated 11 years ago
- UAC Bypass with mmc via alpc☆160Apr 5, 2019Updated 7 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Jul 1, 2017Updated 8 years ago
- source code and binaries related to my trainings☆20Oct 18, 2016Updated 9 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Jan 7, 2020Updated 6 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago
- Black Hat EU 2018 - Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence☆22Jan 14, 2019Updated 7 years ago
- ☆12Aug 2, 2017Updated 8 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 5 years ago