theevilbit / exploit_generator
Automated Exploit generation with WinDBG
☆187Updated 7 years ago
Related projects: ⓘ
- GUI tool to create ROP chains using the ropper API☆155Updated 6 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆115Updated 4 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆81Updated 7 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆149Updated 3 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- The Zulu fuzzer☆125Updated 6 years ago
- Tool to make in memory man in the middle☆124Updated 5 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆214Updated 6 years ago
- A tool for checking exploitability☆210Updated 5 years ago
- windows kernel vulnerability found by me☆90Updated 7 years ago
- ☆136Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆94Updated 7 years ago
- some pocs for antivirus evasion☆129Updated last year
- Collection of software bugs found by SkyLined☆68Updated 7 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 7 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 8 years ago
- Attacking the Core associated source files☆86Updated 6 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 6 years ago
- PoC for CVE-2015-6086☆67Updated 8 years ago
- Personal repository for all ctf related stuffs☆68Updated 2 years ago
- ☆54Updated this week
- ☆74Updated 2 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆86Updated 7 years ago
- Helper script for working with format string bugs☆54Updated 4 years ago
- Wadi Fuzzing Harness☆126Updated 7 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- A set of scripts for a radare-based malware code analysis workflow☆66Updated 5 years ago
- Some example source code for fixed IE11 sandbox escapes.☆139Updated 10 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 8 years ago