taviso / cefdebug
Minimal code to connect to a CEF debugger.
☆194Updated 4 years ago
Related projects: ⓘ
- VerSprite Security Research☆163Updated last year
- PrintDemon is a PoC for a series of issues in the Windows Print Spooler service, as well as potetial misuses of the functionality.☆196Updated 4 years ago
- A repository of previous info-sec presentations I've presented.☆150Updated 2 years ago
- A tool to exploit .NET Remoting Services☆477Updated last month
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆409Updated 2 years ago
- collect for learning cases☆563Updated 3 months ago
- collection of verified Linux kernel exploits☆183Updated 3 years ago
- Dump of win32k POCs for bugs I've found☆369Updated 2 years ago
- TrueType and OpenType font fuzzing toolset☆430Updated 5 years ago
- A thorough library database to assist with binary exploitation tasks.☆195Updated 2 years ago
- Vulnerability examples.☆398Updated 4 months ago
- ☆470Updated 6 years ago
- Encrypted exploit delivery for the masses☆256Updated 4 years ago
- 🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.☆197Updated last year
- A denial-of-service proof-of-concept for CVE-2020-1350☆238Updated 4 years ago
- ☆265Updated last year
- Public work for CVE-2019-0708☆289Updated 4 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆239Updated 2 years ago
- This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.☆221Updated 4 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆375Updated 4 years ago
- A Binary Ninja plugin for vulnerability research.☆278Updated last week
- ☆746Updated last year
- A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation☆229Updated 3 years ago
- research☆148Updated 5 months ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆209Updated 3 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆135Updated 3 years ago
- Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.☆229Updated 3 years ago
- Token Privilege Research☆777Updated 7 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆197Updated last year
- Slide decks from my conference presentations☆356Updated 11 months ago