mrowensnobody / presentation
☆44Updated 6 years ago
Alternatives and similar repositories for presentation:
Users that are interested in presentation are comparing it to the libraries listed below
- Tools for instrumenting Windows Defender's mpengine.dll☆36Updated 6 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆55Updated 7 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Updated 5 years ago
- ☆33Updated 9 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- exploit development☆49Updated 7 years ago
- ☆39Updated 4 years ago
- ☆99Updated 6 years ago
- ☆30Updated 6 years ago
- keynote I gave at GreHack 2019☆18Updated 5 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆55Updated 8 years ago
- Exploit code for CVE-2016-9066☆42Updated 8 years ago
- BlazeFox Exploit☆18Updated 6 years ago
- A fork of AFL for fuzzing Windows binaries☆22Updated 6 years ago
- A fuzz job for ClamAV☆31Updated 8 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- A Modern Approach☆10Updated 9 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- ASLR bypass in Chrome version 77☆24Updated 5 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- PoC code for CVE-2018-9539☆18Updated 6 years ago
- ☆31Updated 7 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- ☆37Updated 5 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 5 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- Magellan PoC☆34Updated 6 years ago
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Updated 7 years ago
- My conference presentations and publications☆26Updated 3 years ago
- by http://whereisk0shl.top/☆35Updated 6 years ago