Repository for my talk on Desktop Bridge at Zer0Con 2018.
☆34Mar 30, 2018Updated 7 years ago
Alternatives and similar repositories for Zer0Con_2018
Users that are interested in Zer0Con_2018 are comparing it to the libraries listed below
Sorting:
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- ☆121Apr 1, 2018Updated 7 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- ☆26Jun 23, 2016Updated 9 years ago
- CVE-2018-15982_PoC☆14Nov 6, 2019Updated 6 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆40Dec 28, 2016Updated 9 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- ☆26Jan 18, 2026Updated last month
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- Grep-like WinDbg extension☆45Apr 7, 2017Updated 8 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Nov 28, 2017Updated 8 years ago
- Slide deck for DefCon Beijing☆39May 15, 2018Updated 7 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- A Pythonic wrapper to MassDNS☆24Mar 21, 2018Updated 7 years ago
- ☆127Apr 8, 2019Updated 6 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- An Android wrapper for Arc☆11May 13, 2018Updated 7 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆216Feb 2, 2018Updated 8 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- ☆15Jan 4, 2021Updated 5 years ago
- Utility for dumping all the information Capstone has on given instructions.☆23Oct 1, 2021Updated 4 years ago
- A collection of random scripts.☆10Jul 20, 2015Updated 10 years ago
- C++ wrapers to simplify working with the JsRT interface to the Chakra JavaScript engine.☆16Nov 16, 2015Updated 10 years ago
- The yaml documents for the CTFman search system.☆12May 16, 2019Updated 6 years ago
- Python Remote Administration Tool☆14Jan 8, 2017Updated 9 years ago
- Accepts a domain name and queries multiple sources to return subdomains. Includes option to scan the returned subdomains to check connect…☆14Aug 9, 2019Updated 6 years ago
- All in one tool for ethical hacking and pen testing.☆13May 22, 2023Updated 2 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆119Apr 19, 2018Updated 7 years ago
- PEDA-like debugger UI for WinDbg☆206Mar 29, 2024Updated last year