realtalk / cve-2013-2094Links
original cve-2013-2094 exploit and a rewritten version for educational purposes
☆90Updated 12 years ago
Alternatives and similar repositories for cve-2013-2094
Users that are interested in cve-2013-2094 are comparing it to the libraries listed below
Sorting:
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 8 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- ☆93Updated 6 years ago
- ☆89Updated 4 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- ☆84Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- ☆46Updated 9 years ago
- windows kernel vulnerability found by me☆90Updated 7 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 10 years ago
- Some kernel exploit i wrote☆76Updated 10 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 9 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆115Updated 9 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 8 years ago
- ☆85Updated last year
- Network and USB protocol fuzzing toolkit.☆34Updated 7 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆53Updated 10 years ago
- Exploits for interesting CTF challenges I have worked on☆65Updated 8 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- MS15-076 Privilege Escalation☆100Updated 9 years ago
- ☆113Updated 8 years ago
- Linux local root exploit for CVE-2014-0038☆194Updated 11 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- Automatically exported from code.google.com/p/it-sec-catalog,new version: https://it-sec-catalog.info/.☆39Updated 10 years ago
- ☆20Updated last year