| googleprojectzero/winafl |
2,195 |
|
0 |
0 |
about 2 years ago |
0 |
|
147 |
apache-2.0 |
C |
| A fork of AFL for fuzzing Windows binaries |
| nixawk/labs |
939 |
|
0 |
0 |
over 7 years ago |
0 |
|
10 |
|
Python |
| Vulnerability Labs for security analysis |
| ionescu007/SpecuCheck |
544 |
|
0 |
0 |
over 6 years ago |
0 |
|
3 |
|
C |
| SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4) |
| badd1e/Disclosures |
373 |
|
0 |
0 |
about 4 years ago |
0 |
|
0 |
|
HTML |
| Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts |
| bohops/UltimateWDACBypassList |
371 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
|
|
| A centralized resource for previously documented WDAC bypass techniques |
| koczkatamas/CVE-2016-0051 |
326 |
|
0 |
0 |
almost 10 years ago |
0 |
|
0 |
|
C# |
| EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016) |
| WyAtu/CVE-2018-8581 |
322 |
|
0 |
0 |
over 7 years ago |
0 |
|
1 |
|
Python |
| CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability |
| danigargu/explodingcan |
219 |
|
0 |
0 |
over 8 years ago |
0 |
|
3 |
|
Python |
| An implementation of NSA's ExplodingCan exploit in Python |
| advanced-threat-research/CVE-2020-16898 |
197 |
|
0 |
0 |
over 5 years ago |
0 |
|
0 |
|
Lua |
| CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule |
| ChiChou/sploits |
189 |
|
0 |
0 |
over 5 years ago |
0 |
|
0 |
|
Objective-C |
| PoC |