Email address | private |
---|---|
First Active | 2009-08-25 |
Last Active | 2011-10-12 |
Whitepaper called Bypassing Windows 7 Kernel ASLR. In this paper, the author explains every step to code an exploit with a useful kernel ASLR bypass. Successful exploitation is performed on Windows 7 SP0 / SP1.
5c3994059d8384faf17163e5cb49cd471cedb061f14e2c2b7ef3cdb5ce5724aa
Symantec Backup Exec System Recovery version 8.5 kernel null pointer dereference crash proof of concept exploit.
8fe48217791153d1a31a66ed324498f54f2c7b00786b5719834eaa8b294e7936
Look N Stop versions 2.06p4 and 2.07 local denial of service exploit.
38366e3de589fd2ef7d0ec4b3ceb59baa2eb4193fea0063403232b046f8805fc
Panda Global Protection 2010 version 3.01.00 local denial of service exploit with unfiltered wcscpy().
b8f8034fca9b425d000da23154d615714b60bd552ae1581119719913e9f55e64
Panda Global Protection 2010 version 3.01.00 local denial of service exploit.
002177a31b3e4110ef699bede0043feb3ba0b836255f7f83f4d651e70937a580
GMER versions 1.0.15.15087 and below suffer from a pointer dereference vulnerability. Both an advisory and exploit are included in this archive.
7cbf50aa017e12f55c31b1f73898c64ed1fe3bdeb1bb0faa8eaac256e81ca369
Microsoft Windows Win32k pointer dereference proof of concept exploit that leverages the vulnerability noted in MS10-098.
88c0d56f4f9ce474815203874c072f79800b80461abd432eb2320a32dcce001a
Whitepaper called Bypassing SEHOP. Microsoft has recently implemented in many Windows versions a new security feature named Structured Exception Handling Overwrite Protection. This paper discusses how it can be bypassed.
494242f6be3d7f34046067b7fd6e0190f1ba76047456124bb6507467ab1279f2
Kaspersky Anti-Virus 2010 version 9.0.0.463 suffers from a denial of service vulnerability.
7ae0cfcd643b35679b0935fa72b27c7089e68d07020a0c1a2084c395b59bc687
Avast! version 4.8.1335 Professional local kernel buffer overflow exploit.
8561ed4b236b1c7dc5fa72e7ec3c492431c87e2b0611b3dc14e20fa298a17ceb