zenhumany / blackhat_asia_2017View external linksLinks
black hat Asia 2017 Slides
☆22Mar 30, 2017Updated 8 years ago
Alternatives and similar repositories for blackhat_asia_2017
Users that are interested in blackhat_asia_2017 are comparing it to the libraries listed below
Sorting:
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆40Dec 28, 2016Updated 9 years ago
- ☆15Jun 12, 2015Updated 10 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- everyone can fuzz h2☆24Mar 13, 2019Updated 6 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Jun 2, 2020Updated 5 years ago
- ☆63Apr 13, 2017Updated 8 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- CVE-2016-3141☆15Apr 23, 2016Updated 9 years ago
- eyuyan image rebuild tools source code☆13Sep 1, 2016Updated 9 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- CVE-2017-5005 for Quick Heal Antivirus☆15Mar 31, 2017Updated 8 years ago
- A web page based fuzzer that generates random JS statements then fuzz in the web-browser.☆60May 6, 2019Updated 6 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- BlackHat Asia 2017 talk☆34Mar 30, 2017Updated 8 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 6 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆28Apr 2, 2016Updated 9 years ago
- Content from presentation at BHUSA 2017☆180Jul 27, 2017Updated 8 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- Source for some problems from PlaidCTF 2014.☆59May 2, 2014Updated 11 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆59Jan 11, 2017Updated 9 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆265Jul 6, 2017Updated 8 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Windows过滤驱动-helloworld☆24Aug 27, 2015Updated 10 years ago
- WinEoP Exploitation Framework☆25Jan 7, 2016Updated 10 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- ☆10Jul 30, 2017Updated 8 years ago
- Assembly code to use for Windows kernel shellcode to edit winlogon.exe ACL☆13Mar 6, 2017Updated 8 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- ☆24Feb 19, 2017Updated 8 years ago