jackery001's repositories
EfiGuard
Disable PatchGuard and DSE at boot time
wtf
wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows.
defcon_27_windbg_workshop
DEFCON 27 workshop - Modern Debugging with WinDbg Preview
e9afl
AFL binary instrumentation
SpoolFool
Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)
cve-2019-1458_POC
POC for cve-2019-1458
rewind
Snapshot-based coverage-guided windows kernel fuzzer
autoharness
A tool that automatically creates fuzzing harnesses based on a library
NTFuzz
NTFUZZ: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis (IEEE S&P '21)
CVE-2021-34486
Windows Etw LPE
hAFL2
A kAFL based hypervisor fuzzer which fully supports nested VMs
CVE-2020-1034
PoC demonstrating the use of cve-2020-1034 for privilege escalation
Ponce
IDA 2016 plugin contest winner! Symbolic Execution just one-click away!
HITB2020_FSFUZZER
My Material for the HITB presentation
ArbitraryDirectoryDeletion
From directory deletion to SYSTEM shell
CurveBall
PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)
UAC_bypass_windows_store
Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)
CDPSvcDllHijacking
Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM
Homework-of-C-Language
C/C++ code examples of my blog.
vm-escape
some interesting vm-escape game
COMahawk
Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322
win32k-bugs
Dump of win32k POCs for bugs I've found
MSRC-Security-Research
Security Research from the Microsoft Security Response Center (MSRC)
ctftool
Interactive CTF Exploration Tool
acCOMplice
Tools for discovery and abuse of COM hijacks
Detect-It-Easy
Program for determining types of files for Windows, Linux and MacOS.
RpcView
RpcView is a free tool to explore and decompile Microsoft RPC interfaces