niklasb / elgoogLinks
elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit
☆68Updated 7 years ago
Alternatives and similar repositories for elgoog
Users that are interested in elgoog are comparing it to the libraries listed below
Sorting:
- ☆62Updated 8 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- ☆99Updated 6 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆94Updated 3 years ago
- ☆90Updated 6 years ago
- Simple library to spray the Windows Kernel Pool☆110Updated 5 years ago
- Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques☆54Updated 7 years ago
- HITCON CTF 2018☆45Updated 6 years ago
- ☆68Updated last year
- ☆36Updated 6 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆90Updated 6 years ago
- WCTF 2019 challenge☆100Updated 6 years ago
- ☆135Updated 5 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆88Updated 6 years ago
- ☆154Updated 6 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 6 years ago
- September Chrome 1day by István Kurucsai☆82Updated 5 years ago
- Web user interface and service agent for the monitoring and remote management of WinAFL.☆53Updated last week
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆85Updated 8 years ago
- A DBI tool to discover heap memory related bugs☆125Updated 7 years ago
- JavaScript Engine Exploits in CTF☆3Updated 6 years ago
- haze binary fuzzer☆53Updated last year
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆39Updated 8 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Updated 5 years ago
- PoCs for VMWare VGPU Direct 3D 10 vulnerabilities fixed in VMware Workstation 12.5.5 and 12.5.7☆36Updated 7 years ago
- Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf☆61Updated 6 years ago
- Solutions for my 34C3CTF challenges☆21Updated 7 years ago
- exploit development☆49Updated 7 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆117Updated 6 years ago