boo0m's repositories
wool_scripts
收集一些QuantumultX、Loon、Surge、ShadowRocket的配置与脚本,去广告合集。不止有QuantumultX脚本!
stateafl
StateAFL: A Greybox Fuzzer for Stateful Network Servers
wtf
wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows.
CVE-2021-28476
PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.
scavenger
QEMU escape code
documentation
Kata Containers version 1.x documentation (for version 2.x see https://github.com/kata-containers/kata-containers).
hypervisor_exploit_templates
Some notes + templates that you can use in your hypervisor research, either for full exploits, or to verify / falsify any assumptions you may make while auditing code.
trivy
A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI
ps4jb
PS4 6.72 jailbreak
windows-XP-SP1
网上泄露的Windows XP SP1 source code
hyperv_local_dos_poc
Microsoft Hyper-V DoS proof-of-concept code
agamotto
Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints
CVE-2020-8617
PoC for CVE-2020-8617 (BIND)
aksp
Another kernel self protection
p0tools
Project Zero Docs and Tools
learn-kvm
Qemu KVM(Kernel Virtual Machine)学习笔记
qemu
Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignored. Please only use release tarballs from the QEMU website.
AFL
american fuzzy lop - a security-oriented fuzzer
redis-rce
Redis 4.x/5.x RCE
Issue-198327
A Webkit RCE exploit and an SBX bug
BlueKeep
Proof of concept for CVE-2019-0708
CVE-2019-0803
Win32k Elevation of Privilege Poc
android-vuln
安卓内核提权漏洞分析
sploits
PoC
acefile
POC of https://research.checkpoint.com/extracting-code-execution-from-winrar/