HackSys Extreme Vulnerable Windows Driver (HEVD)
-
Updated
Dec 7, 2022 - C
HackSys Extreme Vulnerable Windows Driver (HEVD)
PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Advanced buffer overflow and memory corruption security challenges
A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap
Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64.
PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.
PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
Traditional Mitigation in GCC to defend Memory Corruption Vulnerability
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
PoC exploits against various SGX enclaves
Writeups and solver scripts wrote for CTFS and Wargames, mostly memory corruption and reverse engineering tasks.
All things Binary Exploitation, Memory, Assembly and Corruptions.
This repository contains exploit to the webserver from the NETWORK_PROGRAMS repository.
This repository contains exploits to Windows binaries provided by Exploit2 course by opensecuritytraining.
A harmless memory corrupter made in assembly
Some of my Binary Exploitation Write-Ups
Buffer Overflow in Seattle Lab Mail (SLmail) 5.5 - POP3
Add a description, image, and links to the memory-corruption topic page so that developers can more easily learn about it.
To associate your repository with the memory-corruption topic, visit your repo's landing page and select "manage topics."