saelo / cve-2014-0038View external linksLinks
Linux local root exploit for CVE-2014-0038
☆199Apr 18, 2014Updated 11 years ago
Alternatives and similar repositories for cve-2014-0038
Users that are interested in cve-2014-0038 are comparing it to the libraries listed below
Sorting:
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆37Nov 16, 2015Updated 10 years ago
- ☆48Oct 19, 2015Updated 10 years ago
- OpenType font file format fuzzer for Windows☆52Jun 8, 2013Updated 12 years ago
- Windows 8.1 + IE 11 Exploit☆18Jul 26, 2016Updated 9 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆36Dec 31, 2016Updated 9 years ago
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 8 years ago
- OS X tool for dumping IOKit hierarchies in DOT format.☆46Feb 7, 2016Updated 10 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆26Sep 3, 2016Updated 9 years ago
- ☆22Dec 31, 2018Updated 7 years ago
- ☆73Oct 15, 2014Updated 11 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- ☆22May 25, 2017Updated 8 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆69Oct 3, 2013Updated 12 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- ☆17Aug 20, 2014Updated 11 years ago
- Race condition vulnerability example source code.☆12Nov 11, 2015Updated 10 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 10 years ago
- ELF header abuse☆50Mar 23, 2016Updated 9 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- Black Hat 2016 Slides, Paper and Code☆83Aug 10, 2016Updated 9 years ago
- Exploit code for CVE-2016-1757☆83Apr 27, 2016Updated 9 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- PoC code for 32 bit Android OS☆135Dec 15, 2015Updated 10 years ago
- ☆140Jul 17, 2017Updated 8 years ago
- My proof-of-concept exploits for the Linux kernel☆1,561Sep 11, 2025Updated 5 months ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Jan 12, 2015Updated 11 years ago
- CVE-2014-3153 exploit☆19Oct 7, 2015Updated 10 years ago
- A simple Windows driver which crashes the system and turns the BSOD pink☆19May 12, 2016Updated 9 years ago
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 7 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Aug 21, 2014Updated 11 years ago
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆106Jul 26, 2016Updated 9 years ago