Block or Report
Block or report hugsy
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuse🏴☠️ pwn
How to exploit a double free vulnerability in 2021. Use After Free for Dummies
collect for learning cases
PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"
Privilege Escalation Enumeration Script for Windows
codes for my blog post: https://secrary.com/Random/InstrumentationCallback/
Windows x64 handcrafted token stealing kernel-mode shellcode
Insecure Programming by Example - Teach yourself how buffer overflows, format strings, numeric bugs, and other binary security bugs work and how to exploit them
short crackme for Windows XP SP3 (32 bit version). ring0 stuff. IMO very fun x-)
A collection of LLVM transform and analysis passes to write shellcode in regular C
tool for generating wordlists or extending an existing one using mutations.
🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.
LPE exploit for CVE-2023-21768
Exploitable drivers, you know what I mean
DHCP Server Remote Code Execution impact: 2008 R2 SP1 до Server 2019
A Collection of Chrome Sandbox Escape POCs/Exploits for learning
GEF - GDB Enhanced Features for exploit devs & reversers
Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation