niklasb / elgoogView external linksLinks
elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit
☆69Jul 9, 2018Updated 7 years ago
Alternatives and similar repositories for elgoog
Users that are interested in elgoog are comparing it to the libraries listed below
Sorting:
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆148Jul 30, 2017Updated 8 years ago
- Have fun with the LowFragmentationHeap☆253Feb 3, 2021Updated 5 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆90Feb 14, 2019Updated 6 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 7 years ago
- Dump of win32k POCs for bugs I've found☆381Mar 6, 2022Updated 3 years ago
- ☆152Jan 7, 2020Updated 6 years ago
- Solutions for my 34C3CTF challenges☆21Jul 9, 2018Updated 7 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆215Jul 2, 2020Updated 5 years ago
- ☆49Jun 30, 2020Updated 5 years ago
- HITCON CTF 2018☆46Oct 22, 2018Updated 7 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Jul 20, 2019Updated 6 years ago
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆149Mar 2, 2023Updated 2 years ago
- Simple library to spray the Windows Kernel Pool☆110Jan 6, 2020Updated 6 years ago
- ☆89Dec 30, 2018Updated 7 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆258Sep 1, 2022Updated 3 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆440Apr 11, 2025Updated 10 months ago
- ☆130Aug 23, 2022Updated 3 years ago
- POC for cve-2019-1458☆179Jan 17, 2022Updated 4 years ago
- Intel x86 bare metal hypervisor for researching snapshot fuzzing ideas.☆169Dec 2, 2020Updated 5 years ago
- windbg plugin for win32k debugging☆75Oct 14, 2019Updated 6 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- ☆13Jul 31, 2020Updated 5 years ago
- POC For CVE-2022-24483☆14Apr 12, 2022Updated 3 years ago
- Sample WinDbg extension☆15Jun 21, 2019Updated 6 years ago
- Some CTF write up☆255Aug 29, 2025Updated 5 months ago
- My Chrome and Safari exploit code + write-up repo☆531Nov 5, 2021Updated 4 years ago
- iOS/macOS: task_swap_mach_voucher() does not respect MIG semantics leading to use-after-free☆11Jan 30, 2019Updated 7 years ago
- Idapro cpu for OpenRISC arch☆15Mar 25, 2017Updated 8 years ago
- QEMU to drcov trace file☆11Nov 21, 2020Updated 5 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆629Jul 7, 2017Updated 8 years ago
- ☆16Jun 25, 2018Updated 7 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆17Oct 19, 2020Updated 5 years ago
- Exploit code for CVE-2016-9066☆45Mar 19, 2017Updated 8 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆31Apr 29, 2019Updated 6 years ago