HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
-
Updated
Sep 4, 2024 - C
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Advanced buffer overflow and memory corruption security challenges
A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap
Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stage during the Pwn2Own Miami 2022 competition.
PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.
PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
Traditional Mitigation in GCC to defend Memory Corruption Vulnerability
PoC exploits against various SGX enclaves
Writeups and solver scripts wrote for CTFS and Wargames, mostly memory corruption and reverse engineering tasks.
All things Binary Exploitation, Memory, Assembly and Corruptions.
This repository contains exploit to the webserver from the NETWORK_PROGRAMS repository.
This repository contains exploits to Windows binaries provided by Exploit2 course by opensecuritytraining.
Some of my Binary Exploitation Write-Ups
Port of memtester to Android, with modifications to build a standalone binary using ndk-build. This is similar to memtest86 on x86 PCs which tests for RAM errors and memory corruption.
Explore the depths of stack memory management, from basic concepts to algorithms governing procedure calls/returns, all articulated through comprehensive guides.
Add a description, image, and links to the memory-corruption topic page so that developers can more easily learn about it.
To associate your repository with the memory-corruption topic, visit your repo's landing page and select "manage topics."