Linux local root exploit for CVE-2014-0038
☆199Apr 18, 2014Updated 11 years ago
Alternatives and similar repositories for cve-2014-0038
Users that are interested in cve-2014-0038 are comparing it to the libraries listed below
Sorting:
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆36Dec 31, 2016Updated 9 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆38Nov 16, 2015Updated 10 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- Windows 8.1 + IE 11 Exploit☆18Jul 26, 2016Updated 9 years ago
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 8 years ago
- ☆48Oct 19, 2015Updated 10 years ago
- OpenType font file format fuzzer for Windows☆52Jun 8, 2013Updated 12 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- OS X tool for dumping IOKit hierarchies in DOT format.☆46Feb 7, 2016Updated 10 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆69Oct 3, 2013Updated 12 years ago
- Black Hat 2016 Slides, Paper and Code☆83Aug 10, 2016Updated 9 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- ☆22Dec 31, 2018Updated 7 years ago
- PoC code for 32 bit Android OS☆135Dec 15, 2015Updated 10 years ago
- Exploit code for CVE-2016-9066☆45Mar 19, 2017Updated 9 years ago
- ELF Infector's Toolkit☆64May 26, 2016Updated 9 years ago
- ELF header abuse☆50Mar 23, 2016Updated 9 years ago
- CVE-2014-3153 exploit☆19Oct 7, 2015Updated 10 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- ☆22May 25, 2017Updated 8 years ago
- Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)☆140Jan 4, 2017Updated 9 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Sep 10, 2013Updated 12 years ago
- ☆51Oct 5, 2016Updated 9 years ago
- ☆17Aug 20, 2014Updated 11 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Dec 31, 2018Updated 7 years ago
- MS15-076 Privilege Escalation☆101Sep 21, 2015Updated 10 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Dec 30, 2016Updated 9 years ago
- My proof-of-concept exploits for the Linux kernel☆1,568Sep 11, 2025Updated 6 months ago
- ☆73Oct 15, 2014Updated 11 years ago
- Microsoft Edge MemGC Internals☆17Sep 2, 2015Updated 10 years ago
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆306Aug 16, 2024Updated last year
- practice☆69Mar 19, 2020Updated 6 years ago
- Huawei mate 7 TrustZone exploit☆109Aug 4, 2015Updated 10 years ago
- Some kernel exploit i wrote☆77Jan 9, 2015Updated 11 years ago
- iOS Hacker Wiki☆16Apr 3, 2019Updated 6 years ago