HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
翻译 - HackSys Extreme漏洞Windows驱动程序
PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"
#IOS#A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
翻译 - 适用于iOS / macOS的WIP“易受设计攻击” kext,用于播放和学习* OS内核开发
Advanced buffer overflow and memory corruption security challenges
A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap
Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
翻译 - Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stage during the Pwn2Own Miami 2022 competition.
PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.
PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
Traditional Mitigation in GCC to defend Memory Corruption Vulnerability
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
PoC exploits against various SGX enclaves
Writeups and solver scripts wrote for CTFS and Wargames, mostly memory corruption and reverse engineering tasks.
All things Binary Exploitation, Memory, Assembly and Corruptions.
This repository contains exploit to the webserver from the NETWORK_PROGRAMS repository.
This repository contains exploits to Windows binaries provided by Exploit2 course by opensecuritytraining.
Some of my Binary Exploitation Write-Ups
Explore the depths of stack memory management, from basic concepts to algorithms governing procedure calls/returns, all articulated through comprehensive guides.
Buffer Overflow in Seattle Lab Mail (SLmail) 5.5 - POP3