Script to execute in memory a sequence of opcodes
-
Updated
Jun 23, 2014 - C
Script to execute in memory a sequence of opcodes
A repository for learning various heap exploitation techniques.
This repository contains several applications, demonstrating the Meltdown bug.
Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs. 😎
r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems
PoC code for CVE-2018-16713 (exploit by rdmsr)
PoC Code for CVE-2018-18714 (exploit by stack overflow)
PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
This repository contains exploit to the webserver from the NETWORK_PROGRAMS repository.
Source code to my series about the exploitation of windows programms running in WINE under Linux.
Collection of things made during my preparation to take on OSEE
Introductory presentation on stack-based buffer overflows
Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
POC exploit of CVE-2021-3345, a vulnerability in libgcrypt version 1.9.0
Add a description, image, and links to the exploit-development topic page so that developers can more easily learn about it.
To associate your repository with the exploit-development topic, visit your repo's landing page and select "manage topics."