star-sg / windows_patch_extractor
☆19Updated last year
Alternatives and similar repositories for windows_patch_extractor:
Users that are interested in windows_patch_extractor are comparing it to the libraries listed below
- ☆11Updated 2 years ago
- ☆12Updated 3 years ago
- ☆12Updated 4 years ago
- poc code for CVE-2024-38080☆30Updated 6 months ago
- ☆11Updated 5 months ago
- Super IOCTL Basic Fuzzer☆15Updated 5 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆34Updated 3 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆97Updated 4 years ago
- Extract data of TTD trace file to a minidump☆28Updated last year
- Overview of Microsoft Patch Tuesday☆14Updated 6 months ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- My conference presentations and Materials for them.☆32Updated 2 years ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Updated last year
- ☆16Updated 9 months ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Here I store my proof of concepts☆14Updated 6 months ago
- Collection of slides☆33Updated 11 months ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- #INFILTRATE20 raptor's party pack.☆28Updated last year
- LPE of CVE-2024-26230☆23Updated 6 months ago
- winafl with mopt mutators and afl fast power schedulers.☆22Updated last month
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- A collection of various exploits☆27Updated 6 months ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 3 years ago
- WinAFL modified for RDP client fuzzing☆19Updated 2 years ago
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago
- ☆32Updated last year
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆31Updated 4 years ago
- ☆30Updated 2 years ago
- Vulnerability analysis and proof of concepts☆34Updated last year