Security Research
☆36Dec 23, 2021Updated 4 years ago
Alternatives and similar repositories for CVE-2019-0986
Users that are interested in CVE-2019-0986 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- ☆44Apr 20, 2020Updated 5 years ago
- https://jira.atlassian.com/browse/JRASERVER-69793☆10Sep 16, 2019Updated 6 years ago
- CVE-2019-0859 1day Exploit☆119Feb 11, 2020Updated 6 years ago
- Poc for CVE-2019-1253☆155Dec 23, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- win32k use-after-free poc☆71Apr 22, 2020Updated 5 years ago
- ☆18Feb 6, 2019Updated 7 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Jan 25, 2021Updated 5 years ago
- Telegram-based PowerShell Runspace Host☆11Dec 8, 2022Updated 3 years ago
- Proof of Concept code for CVE-2020-0728☆47Feb 12, 2020Updated 6 years ago
- PoC for CVE-2017-0075☆37Sep 12, 2019Updated 6 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Feb 24, 2019Updated 7 years ago
- ☆127Apr 8, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Apr 18, 2019Updated 6 years ago
- Parse PowerShell and Security event logs for sensitive information.☆127Mar 29, 2019Updated 7 years ago
- ☆46Aug 21, 2019Updated 6 years ago
- Chrome v8 1Day Exploit by István Kurucsai☆170Apr 3, 2019Updated 6 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆34Mar 30, 2018Updated 8 years ago
- Simple poc of CVE-2018-8414 Windows Package Setting RCE Vulnerability☆22Sep 21, 2020Updated 5 years ago
- EoP POC for CVE-2019-1132☆61Sep 8, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆165May 1, 2019Updated 6 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Dec 3, 2018Updated 7 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Feb 18, 2023Updated 3 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆15Apr 15, 2020Updated 5 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- ☆130Aug 23, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Apache Tomcat Remote Code Execution on Windows☆189Nov 27, 2019Updated 6 years ago
- cve-2019-0808-poc☆48Mar 25, 2019Updated 7 years ago
- python and honggfuzz☆26May 18, 2020Updated 5 years ago
- gui uac bypass (netplwiz.exe)☆66Sep 2, 2019Updated 6 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Exploits, Exploits, Exploits and more Exploits!☆34Nov 7, 2020Updated 5 years ago
- Exploit for CVE-2019-9810 Firefox on Windows 64-bit.☆228Dec 28, 2019Updated 6 years ago