saelo / cve-2014-0038Links
Linux local root exploit for CVE-2014-0038
☆199Updated 11 years ago
Alternatives and similar repositories for cve-2014-0038
Users that are interested in cve-2014-0038 are comparing it to the libraries listed below
Sorting:
- Helper script for working with format string bugs☆57Updated 5 years ago
- PoC for CVE-2015-6086☆67Updated 9 years ago
- Black Hat 2016 Slides, Paper and Code☆82Updated 9 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Updated 8 years ago
- Collection of software bugs found by SkyLined☆68Updated 9 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- static program analysis tool that generates return-oriented exploits for ELF binaries☆44Updated 7 years ago
- Exploits for interesting CTF challenges I have worked on☆63Updated 8 years ago
- Certified Edible Dinosaurs official CTF toolkit☆120Updated 7 years ago
- ☆49Updated 9 years ago
- ☆79Updated 9 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 9 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 9 years ago
- HitCon 2015 spartan 0day & exploit☆27Updated 10 years ago
- Some kernel exploits☆145Updated 8 years ago
- windows kernel vulnerability found by me☆90Updated 8 years ago
- The Zulu fuzzer☆124Updated 8 years ago
- ☆32Updated 8 years ago
- Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016☆152Updated 9 years ago
- ☆140Updated 8 years ago
- Public Android Vulnerability Information (CVE PoCs etc)☆87Updated 8 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Updated 6 years ago
- Exploit code for CVE-2016-9066☆45Updated 8 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Updated 10 years ago
- ☆49Updated 7 years ago
- ☆25Updated 9 years ago
- ☆91Updated last year
- ☆28Updated 3 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Updated 12 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Updated 10 years ago