saaramar / execve_exploitLinks
Hardcore corruption of my execve() vulnerability in WSL
☆215Updated 7 years ago
Alternatives and similar repositories for execve_exploit
Users that are interested in execve_exploit are comparing it to the libraries listed below
Sorting:
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆118Updated 7 months ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆145Updated 7 years ago
- Content from presentation at BHUSA 2017☆180Updated 7 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Updated 10 years ago
- GUI tool to create ROP chains using the ropper API☆156Updated 7 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Updated 4 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆133Updated 9 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆63Updated 7 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆264Updated 7 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆76Updated 7 years ago
- ☆141Updated 8 years ago
- ☆99Updated 6 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 6 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆164Updated 8 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆84Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆117Updated 6 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 8 years ago
- ☆135Updated 5 years ago
- ☆93Updated 6 years ago
- ☆90Updated 6 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago