Some sample code from my Zero Nights 2017 presentation.
☆60Nov 19, 2017Updated 8 years ago
Alternatives and similar repositories for ZeroNights2017
Users that are interested in ZeroNights2017 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Feb 19, 2017Updated 9 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆139Aug 3, 2017Updated 8 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- ☆17Mar 3, 2016Updated 10 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- Encrypting VHD parser driver for Hyper-V☆10Apr 22, 2016Updated 9 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- ☆59May 1, 2019Updated 6 years ago
- CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux☆24Aug 10, 2025Updated 7 months ago
- ☆22Jul 7, 2017Updated 8 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- Windows过滤驱动-helloworld☆24Aug 27, 2015Updated 10 years ago
- ☆72Nov 20, 2017Updated 8 years ago
- Monitor adapter, Fake DNS, Tunnel, and DHCP combined into one Windows Service☆12Apr 19, 2015Updated 10 years ago
- ☆23Feb 9, 2018Updated 8 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆495Nov 29, 2017Updated 8 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆16Oct 18, 2016Updated 9 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- A set of exploitation/reversing aids for IDA☆421Nov 28, 2017Updated 8 years ago
- ☆11Mar 11, 2015Updated 11 years ago
- Exploit primitives for PowerShell☆437Mar 25, 2018Updated 7 years ago
- Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告☆107Dec 13, 2017Updated 8 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago
- A fork of AFL for fuzzing Windows binaries☆23May 3, 2018Updated 7 years ago
- Securing Data Analytics on Intel SGX using Randomization☆13Aug 30, 2017Updated 8 years ago
- Tool that dumps beacon frames to a pcap file. Works on Windows Vista or Later with any Wireless Card.☆27Mar 19, 2022Updated 4 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆209Nov 20, 2017Updated 8 years ago
- Lists work items being queued currently.☆15Jun 7, 2015Updated 10 years ago
- S2-055的环境,基于rest-show-case改造☆37Dec 7, 2017Updated 8 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Jul 27, 2017Updated 8 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago