tyranid / IE11SandboxEscapes
Some example source code for fixed IE11 sandbox escapes.
☆141Updated 10 years ago
Alternatives and similar repositories for IE11SandboxEscapes:
Users that are interested in IE11SandboxEscapes are comparing it to the libraries listed below
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆132Updated 9 years ago
- ☆33Updated 9 years ago
- windows kernel vulnerability found by me☆91Updated 7 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 8 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆62Updated 7 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- exploit development☆49Updated 7 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 6 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆55Updated 7 years ago
- A clone (of the basic core) of AFL fuzzer☆74Updated 9 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 9 years ago
- PoC for CVE-2015-6086☆67Updated 8 years ago
- ☆34Updated 7 years ago
- Simple library to spray the Windows Kernel Pool☆108Updated 5 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆96Updated 12 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- ☆39Updated 4 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆81Updated 8 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆94Updated 3 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆75Updated 6 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆118Updated 5 months ago
- A static Internet Explorer Fuzzer.☆50Updated 7 years ago
- A windbg extension, extracting token related contents☆41Updated 4 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆84Updated 8 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆81Updated 8 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆60Updated 9 years ago