zteeed / CVE-2018-4407-IOS
POC: Heap buffer overflow in the networking code in the XNU operating system kernel
☆13Updated last year
Alternatives and similar repositories for CVE-2018-4407-IOS:
Users that are interested in CVE-2018-4407-IOS are comparing it to the libraries listed below
- PoC code for CVE-2018-9539☆18Updated 6 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- Fuzzing Framework☆10Updated 7 years ago
- Win32k Elevation of Privilege PocUpdated 5 years ago
- ☆16Updated 4 years ago
- Revisiting Helpviewer.app to hack Parallels for Mac☆17Updated 5 years ago
- ☆20Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- ☆44Updated 6 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Updated 5 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Updated 11 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 8 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- CVE-2018-4330 POC for iOS☆18Updated 6 years ago
- PoC ActiveX SVG Document Execution☆21Updated 6 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- Format string exploit generation☆10Updated 9 years ago
- ☆13Updated 5 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20Updated 5 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- Discover MSSQL Instances via UDP Scanning☆25Updated 6 years ago