rh0dev / slidesLinks
☆20Updated 7 years ago
Alternatives and similar repositories for slides
Users that are interested in slides are comparing it to the libraries listed below
Sorting:
- ☆43Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- PoC for Foxit Reader CVE-2018-14442☆58Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆33Updated 7 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆91Updated 12 years ago
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Updated 8 years ago
- ☆16Updated 8 years ago
- A fork of AFL for fuzzing Windows binaries☆23Updated 7 years ago
- UAC 0Day all day!☆57Updated 8 years ago
- ☆99Updated 7 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 6 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- ☆35Updated 10 years ago
- Break Apps with Frida workshop material☆46Updated 7 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 4 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Updated 11 years ago
- ☆22Updated 7 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Updated 8 years ago
- BlazeFox Exploit☆18Updated 6 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Updated 9 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 6 years ago
- ☆39Updated 4 years ago
- ☆21Updated 6 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Updated 8 years ago