roddux / germyLinks
GERMY is a Linux Kernel n-day in the N_GSM line discipline
☆49Updated last year
Alternatives and similar repositories for germy
Users that are interested in germy are comparing it to the libraries listed below
Sorting:
- Slide of my conference presentations☆14Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- PoC code of Shade BIOS (stripped) presented at Black Hat USA 2025☆60Updated 5 months ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated last year
- ☆85Updated 4 months ago
- Google Chrome Use After Free☆61Updated 3 years ago
- Analysis of the vulnerability☆50Updated last year
- ☆37Updated last year
- Report and exploit of CVE-2023-36427☆88Updated 2 years ago
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆53Updated 3 months ago
- Windbg extension port for rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Updated 2 years ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆98Updated last year
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- ☆14Updated last year
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆123Updated 3 years ago
- Winbindex bot to pull in binaries for specific releases☆48Updated 2 years ago
- ☆74Updated last year
- ☆52Updated 9 months ago
- yet another hidden LKM hunter☆29Updated 3 months ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated last year
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 10 months ago
- ☆33Updated 2 years ago
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆65Updated last year
- A collection of various exploits☆28Updated last year
- BINARLY Research Tools and PoCs☆39Updated last year
- A few examples of how to trap virtual memory access on Windows.☆38Updated last year
- Proof-of-Concept for CVE-2024-26218☆54Updated last year
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Slides about HyperDbg☆40Updated 5 months ago