trickster0 / Brave_Browser_1Day_POC
This is a crash for Brave Browser I found in New Years Eve, used to be a 0day when I found it
☆16Updated last year
Alternatives and similar repositories for Brave_Browser_1Day_POC:
Users that are interested in Brave_Browser_1Day_POC are comparing it to the libraries listed below
- BOF/COFF obj file to PIC(shellcode). by golang☆37Updated 2 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆32Updated 4 months ago
- Slides from out talk at BH IL 2022☆28Updated 2 years ago
- ☆40Updated 3 years ago
- LPE of CVE-2024-26230☆21Updated 4 months ago
- Adobe Reader DC Information Leak Exploit☆22Updated 2 years ago
- works but not work, cao!☆24Updated 3 years ago
- Proofs-Of-360Security Sandbox Escape☆10Updated 2 years ago
- ☆9Updated 11 months ago
- Just another version of the custom stack call from Proxy-Function-Calls-For-ETwTI☆31Updated last year
- 针对于AzureAttestService服务的本地提权Eop,微软表示已经进行修复☆2Updated 2 years ago
- CobaltStrike BOF - Inject ETW Bypass into Remote Process via Syscalls (HellsGate|HalosGate)☆30Updated 3 years ago
- impersonate trustedinstaller by fiddling with tokens☆17Updated 3 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- Beacon Debugger☆39Updated 3 months ago
- SyscallLoader☆10Updated 3 years ago
- A simple BOF implementation of klist using Windows API☆30Updated 2 years ago
- ☆26Updated 3 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆22Updated 4 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated 8 months ago
- PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"☆59Updated 2 years ago
- inject shellcode into remote process via message hook☆15Updated 4 years ago
- VM escape (QEMU, VirtualBox, VMware)☆17Updated 2 years ago
- Beacon Object Files.☆32Updated 11 months ago
- Files for http://deniable.org/windows/windows-callbacks☆24Updated 4 years ago
- ☆16Updated 10 months ago
- x64 version☆30Updated 3 years ago
- ☆49Updated 2 years ago
- DPX - the Doge Packer for eXecutables☆27Updated 3 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆38Updated 4 years ago