boo0m's repositories

acefile

POC of https://research.checkpoint.com/extracting-code-execution-from-winrar/

Language:PythonStargazers:0Issues:2Issues:0

AFL

american fuzzy lop - a security-oriented fuzzer

Language:CLicense:Apache-2.0Stargazers:0Issues:1Issues:0

agamotto

Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints

Language:CStargazers:0Issues:1Issues:0

aksp

Another kernel self protection

Stargazers:0Issues:1Issues:0

android-vuln

安卓内核提权漏洞分析

Language:CStargazers:0Issues:2Issues:0

BlueKeep

Proof of concept for CVE-2019-0708

Language:PythonStargazers:0Issues:1Issues:0

CVE-2019-0803

Win32k Elevation of Privilege Poc

Language:C++Stargazers:0Issues:2Issues:0

CVE-2020-8617

PoC for CVE-2020-8617 (BIND)

Language:DockerfileLicense:Apache-2.0Stargazers:0Issues:1Issues:0

CVE-2021-28476

PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.

Language:CLicense:MITStargazers:0Issues:1Issues:0

documentation

Kata Containers version 1.x documentation (for version 2.x see https://github.com/kata-containers/kata-containers).

Language:ShellLicense:Apache-2.0Stargazers:0Issues:0Issues:0
Language:PythonLicense:BSD-3-ClauseStargazers:0Issues:0Issues:0

hyperv_local_dos_poc

Microsoft Hyper-V DoS proof-of-concept code

Language:CStargazers:0Issues:1Issues:0

hypervisor_exploit_templates

Some notes + templates that you can use in your hypervisor research, either for full exploits, or to verify / falsify any assumptions you may make while auditing code.

Language:CStargazers:0Issues:1Issues:0

Issue-198327

A Webkit RCE exploit and an SBX bug

Language:HTMLStargazers:0Issues:1Issues:0

learn-kvm

Qemu KVM(Kernel Virtual Machine)学习笔记

Language:CStargazers:0Issues:1Issues:0

p0tools

Project Zero Docs and Tools

Language:HTMLLicense:Apache-2.0Stargazers:0Issues:1Issues:0

ps4jb

PS4 6.72 jailbreak

Language:JavaScriptStargazers:0Issues:1Issues:0

qemu

Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignored. Please only use release tarballs from the QEMU website.

Language:CLicense:NOASSERTIONStargazers:0Issues:1Issues:0

redis-rce

Redis 4.x/5.x RCE

Language:PythonStargazers:0Issues:1Issues:0

scavenger

QEMU escape code

Language:CStargazers:0Issues:1Issues:0
Stargazers:0Issues:0Issues:0
Language:Objective-CStargazers:0Issues:2Issues:0
Language:C++Stargazers:0Issues:1Issues:0

stateafl

StateAFL: A Greybox Fuzzer for Stateful Network Servers

Language:CLicense:Apache-2.0Stargazers:0Issues:0Issues:0

trivy

A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI

Language:GoLicense:Apache-2.0Stargazers:0Issues:1Issues:0
Language:C++Stargazers:0Issues:2Issues:0

windows-XP-SP1

网上泄露的Windows XP SP1 source code

Stargazers:0Issues:1Issues:0

wool_scripts

收集一些QuantumultX、Loon、Surge、ShadowRocket的配置与脚本,去广告合集。不止有QuantumultX脚本!

License:GPL-3.0Stargazers:0Issues:0Issues:0

wtf

wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows.

Language:C++License:MITStargazers:0Issues:1Issues:0
Stargazers:0Issues:0Issues:0