realtalk / cve-2013-2094Links
original cve-2013-2094 exploit and a rewritten version for educational purposes
☆90Updated 12 years ago
Alternatives and similar repositories for cve-2013-2094
Users that are interested in cve-2013-2094 are comparing it to the libraries listed below
Sorting:
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 8 years ago
- ☆93Updated 6 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- ☆112Updated 7 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- ☆84Updated 8 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 9 years ago
- Heartbleed (CVE-2014-0160) client exploit☆323Updated 9 years ago
- MS15-076 Privilege Escalation☆100Updated 9 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆91Updated 11 years ago
- ☆46Updated 9 years ago
- windows kernel vulnerability found by me☆90Updated 7 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆118Updated 6 months ago
- ☆89Updated 4 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- Python Web framework P0wner☆75Updated 12 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆75Updated 7 years ago
- PoC for CVE-2015-6086☆69Updated 9 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆78Updated 6 years ago
- Collection of software bugs found by SkyLined☆68Updated 8 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆83Updated 8 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- Network and USB protocol fuzzing toolkit.☆34Updated 7 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆115Updated 8 years ago
- ☆99Updated 6 years ago
- some tasks/solutions from CTF challenges☆67Updated 8 years ago
- Exploit collection for NT privilege escalation☆65Updated 9 years ago