HitCon-2015-spartan-0day-exploit

Memory exploit

Exploiting vulnerabilities in Microsoft's Spartan memory management system to bypass security features and gain unauthorized access

HitCon 2015 spartan 0day & exploit

GitHub

26 stars
8 watching
25 forks
last commit: about 9 years ago

Related projects:

Repository Description Stars
exp-sky/hitcon-2014-ie-11-0day-windows-8.1-exploit An exploit for a previously unknown vulnerability in Internet Explorer 11 and Windows 8.1, allowing unauthorized access to the system. 25
exp-sky/hitcon-2016-windows-10-x64-edge-0day-and-exploit Exploiting Windows 10 x64 edge case on Microsoft Edge browser 101
exp-sky/xkungfoo-2013 Analyzing and exploiting IE 0day vulnerabilities to demonstrate rapid, deep, and accurate analysis methods 6
abatchy17/windowsexploits A collection of precompiled Windows exploit binaries 1,829
exp-sky/asiasecwest-2018-chakra-vulnerability-and-exploit-bypass-all-system-mitigation A comprehensive guide to bypassing security measures in Chakra browser vulnerabilities 82
demi6od/smashing_the_browser An in-depth exploration of browser exploitation techniques and vulnerability discovery 446
shipcod3/mazda_getinfo Demonstrates how a USB port can be exploited to access a car's infotainment system 157
r3dxpl0it/cve-2018-4407 Exploits a heap buffer overflow vulnerability in the XNU operating system kernel to cause a denial-of-service attack on iOS and macOS devices. 35
nyxgeek/lyncsmash Tools for discovering and exploiting weaknesses in Microsoft Lync/Skype for Business installations 333
nccgroup/exploit_mitigations A knowledge base documenting exploit mitigations across various operating systems and software 874
stephenbradshaw/vulnserver A tool designed to help developers learn how to find and exploit buffer overflow bugs in software 1,001
mssabr01/sixnet-tools A tool that exploits vulnerabilities in Sixnet RTUs to gain root-level access 16
vysecurity/cve-2018-4878 Exploits a vulnerability in outdated Shockwave Flash player to gain control of Internet Explorer and execute malicious code. 87
ssteo/hitbsecconf2021ams-poc A proof-of-concept demonstrating a covert channel for command and control (C&C) and data exfiltration using AWS GuardDuty in a post-DNS era 2
danigargu/cve-2020-0796 An exploit tool for a Windows SMBv3 vulnerability 1,304