tyranid / IE11SandboxEscapesLinks
Some example source code for fixed IE11 sandbox escapes.
☆141Updated 10 years ago
Alternatives and similar repositories for IE11SandboxEscapes
Users that are interested in IE11SandboxEscapes are comparing it to the libraries listed below
Sorting:
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- windows kernel vulnerability found by me☆90Updated 7 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆134Updated 9 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Updated 12 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆64Updated 7 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆164Updated 8 years ago
- ☆35Updated 9 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- kernel exploitation helper class☆77Updated 8 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Updated 8 years ago
- An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit☆81Updated 8 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 9 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆76Updated 7 years ago
- ☆91Updated 5 years ago
- A static Internet Explorer Fuzzer.☆50Updated 8 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆85Updated 8 years ago
- ☆39Updated 4 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆145Updated 7 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Updated 9 years ago
- A Python tool to generate ROP chains☆64Updated 5 months ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆60Updated 9 years ago
- PoC for CVE-2015-6086☆69Updated 9 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- Simple library to spray the Windows Kernel Pool☆110Updated 5 years ago
- A MS OpenXML Format Fuzzing Framework☆84Updated 7 years ago
- C++-based shellcode builder☆114Updated 4 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆119Updated 8 months ago