yoava333 / presentationsLinks
A repository for my conference presentations
☆35Updated 5 years ago
Alternatives and similar repositories for presentations
Users that are interested in presentations are comparing it to the libraries listed below
Sorting:
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 7 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆14Updated 5 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆69Updated 5 years ago
- ☆37Updated 6 years ago
- ☆135Updated 5 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆47Updated 5 years ago
- ☆50Updated 6 years ago
- ASLR bypass in Chrome version 77☆24Updated 6 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆95Updated 4 years ago
- Super IOCTL Basic Fuzzer☆15Updated 6 years ago
- ☆46Updated 6 years ago
- ☆30Updated 3 months ago
- My public presentations☆42Updated 2 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆86Updated 6 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 5 years ago
- #INFILTRATE20 raptor's party pack.☆29Updated this week
- ☆22Updated 6 years ago
- ☆34Updated 5 years ago
- ☆79Updated 8 months ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆95Updated 6 years ago
- Windows syscall fuzzer that I used in 2017 & 2018. Not much to say about it but maybe helpful to someone. At least syscall information it…☆20Updated 5 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 6 years ago
- ☆14Updated 6 years ago
- New improved corpus distillation toolset that has helped to found tens of vulnerabilities in MS and Adobe products☆55Updated 5 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 6 years ago
- Dockerfiles for (un)popular fuzzers!☆30Updated 5 years ago
- ☆100Updated 7 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- ☆43Updated 7 years ago
- ☆27Updated 5 years ago