theori-io / cve-2016-0189Links
Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)
☆114Updated 9 years ago
Alternatives and similar repositories for cve-2016-0189
Users that are interested in cve-2016-0189 are comparing it to the libraries listed below
Sorting:
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆61Updated 9 years ago
- ☆93Updated 7 years ago
- ☆74Updated 3 years ago
- windows kernel vulnerability found by me☆90Updated 7 years ago
- ☆111Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 7 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 8 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- ☆142Updated 8 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Updated 4 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆81Updated 8 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆176Updated 7 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago
- my public code☆167Updated 8 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆70Updated 10 years ago
- some pocs for antivirus evasion☆132Updated last year
- Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)☆139Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- libpcap based ICMP encrypted backdoor for linux.☆133Updated 4 years ago
- GUI tool to create ROP chains using the ropper API☆158Updated 7 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Updated 11 years ago
- A Python, client/server, mutation-based file fuzzer that uses PyDBG to monitor the target application. Check out the README for full deta…☆52Updated 9 years ago
- Exploits for interesting CTF challenges I have worked on☆65Updated 8 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- Simple tool to automate adding shellcode to PE files☆49Updated 7 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 8 years ago
- Public repository for improvements to the EXTRABACON exploit☆162Updated 8 years ago
- Collection of software bugs found by SkyLined☆68Updated 8 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆60Updated 8 years ago