oxiqa / IRFuzzLinks
☆25Updated 4 years ago
Alternatives and similar repositories for IRFuzz
Users that are interested in IRFuzz are comparing it to the libraries listed below
Sorting:
- CVE-2019-12949☆26Updated 5 years ago
- ☆18Updated 6 years ago
- a open source rat from china☆26Updated 8 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago
- interesting analysis☆16Updated 7 years ago
- Research Exploit's and Poc's☆11Updated 7 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20Updated 6 years ago
- PoC for CVE-2019-10207☆19Updated 3 years ago
- Security Research☆36Updated 3 years ago
- crash poc & Leak info PoC☆18Updated 7 years ago
- Green shellcode challenge tools☆22Updated 6 years ago
- IIS Handler for *.ps1 files☆9Updated 5 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Updated 7 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 7 years ago
- Win32k Elevation of Privilege Poc☆1Updated 6 years ago
- CVE-2019-10149 privilege escalation☆9Updated 5 years ago
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Updated 5 years ago
- Pulse Secure VPN mitm Research - CVE-2020-8241, CVE-2020-8239☆23Updated 4 years ago
- Remove individual lines from Windows Event Viewer Log (EVT) files☆44Updated 4 years ago
- Slide deck for DefCon Beijing☆39Updated 7 years ago
- Linux AV tests☆13Updated 6 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- PoC ActiveX SVG Document Execution☆21Updated 6 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 6 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Updated 5 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- AppLocker Bypass With Regasm/InstallUtil☆23Updated 6 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆19Updated 6 years ago
- Use to generate DLL through Visual Studio☆19Updated 7 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Updated 5 years ago