thezdi / derbycon2017View external linksLinks
DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor
☆58Nov 28, 2017Updated 8 years ago
Alternatives and similar repositories for derbycon2017
Users that are interested in derbycon2017 are comparing it to the libraries listed below
Sorting:
- ☆31Jan 4, 2018Updated 8 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- ☆18Dec 3, 2024Updated last year
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 8 years ago
- A set of demos and a PowerShell module to interact with DotNetInterop.☆68Apr 7, 2018Updated 7 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 6 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- 对windows-api内容进行自动审查和过滤监控☆15May 30, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Jul 29, 2019Updated 6 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Nov 19, 2017Updated 8 years ago
- Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)☆140Jan 4, 2017Updated 9 years ago
- ☆26Jun 23, 2016Updated 9 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆33Mar 30, 2018Updated 7 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Mar 14, 2018Updated 7 years ago
- macOS Kernel Fuzzer☆259Oct 23, 2017Updated 8 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Jan 13, 2016Updated 10 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Mar 20, 2021Updated 4 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆41Apr 28, 2018Updated 7 years ago
- ☆164May 18, 2018Updated 7 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- Expression generator for WebAssembly☆18Jul 6, 2018Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Some kernel fuzzing paper about windows and linux☆255Oct 9, 2017Updated 8 years ago
- ☆11Aug 21, 2016Updated 9 years ago
- ☆234Sep 10, 2017Updated 8 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- windows kernel vulnerability found by me☆90Aug 28, 2017Updated 8 years ago
- A web page based fuzzer that generates random JS statements then fuzz in the web-browser.☆60May 6, 2019Updated 6 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- Grep-like WinDbg extension☆45Apr 7, 2017Updated 8 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago