progmboy / cansecwest2017View external linksLinks
☆63Apr 13, 2017Updated 8 years ago
Alternatives and similar repositories for cansecwest2017
Users that are interested in cansecwest2017 are comparing it to the libraries listed below
Sorting:
- ☆31Jan 4, 2018Updated 8 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆148Jul 30, 2017Updated 8 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- ☆10Jun 9, 2021Updated 4 years ago
- ☆14May 8, 2017Updated 8 years ago
- ☆10Sep 29, 2019Updated 6 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆59Jan 11, 2017Updated 9 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- Simple library to spray the Windows Kernel Pool☆110Jan 6, 2020Updated 6 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- Some kernel fuzzing paper about windows and linux☆255Oct 9, 2017Updated 8 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Any useful windbg plugins I've written.☆117Apr 10, 2018Updated 7 years ago
- IDA PDB Loader☆49Sep 21, 2018Updated 7 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Feb 2, 2018Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- deprecated☆27Mar 20, 2019Updated 6 years ago
- Slides of 44Con 2018☆22Oct 11, 2018Updated 7 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- A windbg extension, extracting token related contents☆41Dec 23, 2020Updated 5 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- ☆11Apr 30, 2021Updated 4 years ago
- A memory engine that scans, debugs and disassembles an applications memory space.☆14Oct 29, 2017Updated 8 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Aug 21, 2014Updated 11 years ago
- The internal Windows structures hack to create the in-process private ETW session☆13Feb 22, 2017Updated 8 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Dec 12, 2014Updated 11 years ago
- ☆14Jun 27, 2017Updated 8 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- eyuyan image rebuild tools source code☆13Sep 1, 2016Updated 9 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆629Jul 7, 2017Updated 8 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆344May 5, 2019Updated 6 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- Some tools☆10Dec 5, 2017Updated 8 years ago