r00tk1ts / exploit-database-papers-translation
Use to collect translations of the exp-db-papers
☆9Updated 7 years ago
Alternatives and similar repositories for exploit-database-papers-translation:
Users that are interested in exploit-database-papers-translation are comparing it to the libraries listed below
- KernelBugTest☆15Updated 6 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Updated 7 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Updated 9 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- ☆12Updated 3 years ago
- crash poc & Leak info PoC☆18Updated 7 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 6 years ago
- POC for CVE-2021-1699☆16Updated 4 years ago
- ☆18Updated 6 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Updated 6 years ago
- ☆14Updated 5 years ago
- Resources from my journey into Windows binary exploitation☆22Updated 6 years ago
- POC for a race condition exploit using directory junctions in Windows☆16Updated 4 years ago
- ☆25Updated 6 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Updated 4 years ago
- ☆11Updated 6 years ago
- ☆19Updated 5 years ago
- Use to generate DLL through Visual Studio☆18Updated 7 years ago
- ☆11Updated 3 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Updated 6 years ago
- 参考taviso的代码逆向一下mpengine.dll☆19Updated 2 years ago
- User-mode part of Zerokit platform☆20Updated 6 years ago
- ACTIVELabs Security Advisories☆21Updated 3 years ago
- Research Exploit's and Poc's☆11Updated 6 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Updated 6 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Updated 5 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- Green shellcode challenge tools☆22Updated 6 years ago
- Legal access: The driver and console app to demonstrate the basic memory access in kernel mode☆9Updated 7 years ago