HitCon-2015-spartan-0day-exploit
Memory exploit
Exploiting vulnerabilities in Microsoft's Spartan memory management system to bypass security features and gain unauthorized access
HitCon 2015 spartan 0day & exploit
26 stars
8 watching
25 forks
last commit: about 9 years ago Related projects:
Repository | Description | Stars |
---|---|---|
exp-sky/hitcon-2014-ie-11-0day-windows-8.1-exploit | An exploit for a previously unknown vulnerability in Internet Explorer 11 and Windows 8.1, allowing unauthorized access to the system. | 25 |
exp-sky/hitcon-2016-windows-10-x64-edge-0day-and-exploit | Exploiting Windows 10 x64 edge case on Microsoft Edge browser | 101 |
exp-sky/xkungfoo-2013 | Analyzing and exploiting IE 0day vulnerabilities to demonstrate rapid, deep, and accurate analysis methods | 6 |
abatchy17/windowsexploits | A collection of precompiled Windows exploit binaries | 1,829 |
exp-sky/asiasecwest-2018-chakra-vulnerability-and-exploit-bypass-all-system-mitigation | A comprehensive guide to bypassing security measures in Chakra browser vulnerabilities | 82 |
demi6od/smashing_the_browser | An in-depth exploration of browser exploitation techniques and vulnerability discovery | 446 |
shipcod3/mazda_getinfo | Demonstrates how a USB port can be exploited to access a car's infotainment system | 157 |
r3dxpl0it/cve-2018-4407 | Exploits a heap buffer overflow vulnerability in the XNU operating system kernel to cause a denial-of-service attack on iOS and macOS devices. | 35 |
nyxgeek/lyncsmash | Tools for discovering and exploiting weaknesses in Microsoft Lync/Skype for Business installations | 333 |
nccgroup/exploit_mitigations | A knowledge base documenting exploit mitigations across various operating systems and software | 874 |
stephenbradshaw/vulnserver | A tool designed to help developers learn how to find and exploit buffer overflow bugs in software | 1,001 |
mssabr01/sixnet-tools | A tool that exploits vulnerabilities in Sixnet RTUs to gain root-level access | 16 |
vysecurity/cve-2018-4878 | Exploits a vulnerability in outdated Shockwave Flash player to gain control of Internet Explorer and execute malicious code. | 87 |
ssteo/hitbsecconf2021ams-poc | A proof-of-concept demonstrating a covert channel for command and control (C&C) and data exfiltration using AWS GuardDuty in a post-DNS era | 2 |
danigargu/cve-2020-0796 | An exploit tool for a Windows SMBv3 vulnerability | 1,304 |