jackery001's repositories
acCOMplice
Tools for discovery and abuse of COM hijacks
ArbitraryDirectoryDeletion
From directory deletion to SYSTEM shell
autoharness
A tool that automatically creates fuzzing harnesses based on a library
CDPSvcDllHijacking
Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM
COMahawk
Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322
ctftool
Interactive CTF Exploration Tool
CurveBall
PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)
cve-2019-1458_POC
POC for cve-2019-1458
CVE-2020-1034
PoC demonstrating the use of cve-2020-1034 for privilege escalation
CVE-2021-34486
Windows Etw LPE
defcon_27_windbg_workshop
DEFCON 27 workshop - Modern Debugging with WinDbg Preview
Detect-It-Easy
Program for determining types of files for Windows, Linux and MacOS.
e9afl
AFL binary instrumentation
EfiGuard
Disable PatchGuard and DSE at boot time
hAFL2
A kAFL based hypervisor fuzzer which fully supports nested VMs
HITB2020_FSFUZZER
My Material for the HITB presentation
Homework-of-C-Language
C/C++ code examples of my blog.
MSRC-Security-Research
Security Research from the Microsoft Security Response Center (MSRC)
NTFuzz
NTFUZZ: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis (IEEE S&P '21)
Ponce
IDA 2016 plugin contest winner! Symbolic Execution just one-click away!
rewind
Snapshot-based coverage-guided windows kernel fuzzer
RpcView
RpcView is a free tool to explore and decompile Microsoft RPC interfaces
SpoolFool
Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)
UAC_bypass_windows_store
Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)
vm-escape
some interesting vm-escape game
win32k-bugs
Dump of win32k POCs for bugs I've found
wtf
wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows.