theevilbit / exploitsLinks
☆88Updated last year
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- ☆35Updated 2 years ago
- IDA plugin that resolves PPL calls to the actual underlying PPL function.☆56Updated 2 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 7 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆33Updated 2 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆42Updated 4 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 6 years ago
- ☆86Updated 2 years ago
- Export disassemblies into Protocol Buffers☆21Updated 4 months ago
- Analysis of VBS exploit CVE-2018-8174☆31Updated 7 years ago
- MacOS kernel memory leak (4 bytes)☆30Updated 5 years ago
- My public presentations☆42Updated 2 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- Kernel Stack info leak at exportObjectToClient function☆42Updated 6 years ago
- Flare-On solutions☆37Updated 6 years ago
- Containerized IDA Pro (Windows/Wine), DEPRECIATED, please use https://github.com/NyaMisty/docker-wine-ida☆27Updated 7 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆24Updated last year
- Enumerate Location Services using CoreLocation API on macOS☆18Updated 3 years ago
- ☆14Updated 2 years ago
- ☆17Updated 5 years ago
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆35Updated 4 years ago
- My conference presentations and publications☆26Updated 3 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 4 years ago
- ☆30Updated 4 months ago
- Local privilege escalation through macOS 10.12.1 via CVE-2016-1825 or CVE-2016-7617.☆65Updated 8 years ago
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆23Updated 6 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- ☆79Updated 8 months ago
- ☆34Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year