├── Blitzin_ICC_Connection_File_BOF ├── Blitzin_ICC_Connection_File_Buffer_Overflow.py └── README.md ├── CVE_2019_5782 └── CVE_2019_5782.js ├── ESET_SmartSecurity_Kernel_Leak ├── LeakDriverKernelAddress.cpp └── README.md ├── Exploit_2015_0311 ├── Exploit_2015_0311.as3proj ├── bin │ ├── Exploit20150311.swf │ ├── expressInstall.swf │ ├── index.html │ ├── js │ │ ├── httpcookies.js │ │ └── swfobject.js │ └── poc_2015_0311.html ├── obj │ ├── Exploit_2015_0311Config.old │ ├── Exploit_2015_0311Config.xml │ └── Exploit_2015_0311Config.xml.old └── src │ └── Main.as ├── Intel_Hardware_Accelerated_Execution_Manager_OOB_ReadWrite ├── PoC.c └── README.md ├── LICENSE ├── README.md ├── TestingFltCommunicationPort └── TestFltCommunicationPort.c ├── TrendMicro_Security_Kernel_Driver_Null_Pointer_Dereference_Vulnerability ├── DebugInformation.txt ├── README.md ├── bsod.PNG └── tmicro1.cpp ├── VMware_SVGA_Driver_Hang ├── README.md ├── controlled_ObReferenecObjectByHandle.png ├── event_references.png └── vm3dmp_escape_hang.cpp ├── WebGate_Control_Center_FileConverter_Heap_Overflow_RCE ├── README.md ├── WebGate_Control_Center_FileConverter_GetRecFileInfo_Stack_and_Heap_Overflow_Remote_Code_Execution_Exploit.html └── unescapeShellcodeEncoder.py └── simple_trace.py /Blitzin_ICC_Connection_File_BOF/Blitzin_ICC_Connection_File_Buffer_Overflow.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/Blitzin_ICC_Connection_File_BOF/Blitzin_ICC_Connection_File_Buffer_Overflow.py -------------------------------------------------------------------------------- /Blitzin_ICC_Connection_File_BOF/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/Blitzin_ICC_Connection_File_BOF/README.md -------------------------------------------------------------------------------- /CVE_2019_5782/CVE_2019_5782.js: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/CVE_2019_5782/CVE_2019_5782.js -------------------------------------------------------------------------------- /ESET_SmartSecurity_Kernel_Leak/LeakDriverKernelAddress.cpp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/ESET_SmartSecurity_Kernel_Leak/LeakDriverKernelAddress.cpp -------------------------------------------------------------------------------- /ESET_SmartSecurity_Kernel_Leak/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/ESET_SmartSecurity_Kernel_Leak/README.md -------------------------------------------------------------------------------- /Exploit_2015_0311/Exploit_2015_0311.as3proj: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/Exploit_2015_0311/Exploit_2015_0311.as3proj -------------------------------------------------------------------------------- /Exploit_2015_0311/bin/Exploit20150311.swf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/Exploit_2015_0311/bin/Exploit20150311.swf -------------------------------------------------------------------------------- /Exploit_2015_0311/bin/expressInstall.swf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/Exploit_2015_0311/bin/expressInstall.swf -------------------------------------------------------------------------------- /Exploit_2015_0311/bin/index.html: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/Exploit_2015_0311/bin/index.html -------------------------------------------------------------------------------- /Exploit_2015_0311/bin/js/httpcookies.js: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/Exploit_2015_0311/bin/js/httpcookies.js -------------------------------------------------------------------------------- /Exploit_2015_0311/bin/js/swfobject.js: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/Exploit_2015_0311/bin/js/swfobject.js -------------------------------------------------------------------------------- /Exploit_2015_0311/bin/poc_2015_0311.html: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/Exploit_2015_0311/bin/poc_2015_0311.html -------------------------------------------------------------------------------- /Exploit_2015_0311/obj/Exploit_2015_0311Config.old: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/Exploit_2015_0311/obj/Exploit_2015_0311Config.old -------------------------------------------------------------------------------- /Exploit_2015_0311/obj/Exploit_2015_0311Config.xml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/Exploit_2015_0311/obj/Exploit_2015_0311Config.xml -------------------------------------------------------------------------------- /Exploit_2015_0311/obj/Exploit_2015_0311Config.xml.old: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/Exploit_2015_0311/obj/Exploit_2015_0311Config.xml.old -------------------------------------------------------------------------------- /Exploit_2015_0311/src/Main.as: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/Exploit_2015_0311/src/Main.as -------------------------------------------------------------------------------- /Intel_Hardware_Accelerated_Execution_Manager_OOB_ReadWrite/PoC.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/Intel_Hardware_Accelerated_Execution_Manager_OOB_ReadWrite/PoC.c -------------------------------------------------------------------------------- /Intel_Hardware_Accelerated_Execution_Manager_OOB_ReadWrite/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/Intel_Hardware_Accelerated_Execution_Manager_OOB_ReadWrite/README.md -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/LICENSE -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/README.md -------------------------------------------------------------------------------- /TestingFltCommunicationPort/TestFltCommunicationPort.c: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/TestingFltCommunicationPort/TestFltCommunicationPort.c -------------------------------------------------------------------------------- /TrendMicro_Security_Kernel_Driver_Null_Pointer_Dereference_Vulnerability/DebugInformation.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/TrendMicro_Security_Kernel_Driver_Null_Pointer_Dereference_Vulnerability/DebugInformation.txt -------------------------------------------------------------------------------- /TrendMicro_Security_Kernel_Driver_Null_Pointer_Dereference_Vulnerability/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/TrendMicro_Security_Kernel_Driver_Null_Pointer_Dereference_Vulnerability/README.md -------------------------------------------------------------------------------- /TrendMicro_Security_Kernel_Driver_Null_Pointer_Dereference_Vulnerability/bsod.PNG: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/TrendMicro_Security_Kernel_Driver_Null_Pointer_Dereference_Vulnerability/bsod.PNG -------------------------------------------------------------------------------- /TrendMicro_Security_Kernel_Driver_Null_Pointer_Dereference_Vulnerability/tmicro1.cpp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/TrendMicro_Security_Kernel_Driver_Null_Pointer_Dereference_Vulnerability/tmicro1.cpp -------------------------------------------------------------------------------- /VMware_SVGA_Driver_Hang/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/VMware_SVGA_Driver_Hang/README.md -------------------------------------------------------------------------------- /VMware_SVGA_Driver_Hang/controlled_ObReferenecObjectByHandle.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/VMware_SVGA_Driver_Hang/controlled_ObReferenecObjectByHandle.png -------------------------------------------------------------------------------- /VMware_SVGA_Driver_Hang/event_references.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/VMware_SVGA_Driver_Hang/event_references.png -------------------------------------------------------------------------------- /VMware_SVGA_Driver_Hang/vm3dmp_escape_hang.cpp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/VMware_SVGA_Driver_Hang/vm3dmp_escape_hang.cpp -------------------------------------------------------------------------------- /WebGate_Control_Center_FileConverter_Heap_Overflow_RCE/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/WebGate_Control_Center_FileConverter_Heap_Overflow_RCE/README.md -------------------------------------------------------------------------------- /WebGate_Control_Center_FileConverter_Heap_Overflow_RCE/WebGate_Control_Center_FileConverter_GetRecFileInfo_Stack_and_Heap_Overflow_Remote_Code_Execution_Exploit.html: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/WebGate_Control_Center_FileConverter_Heap_Overflow_RCE/WebGate_Control_Center_FileConverter_GetRecFileInfo_Stack_and_Heap_Overflow_Remote_Code_Execution_Exploit.html -------------------------------------------------------------------------------- /WebGate_Control_Center_FileConverter_Heap_Overflow_RCE/unescapeShellcodeEncoder.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/WebGate_Control_Center_FileConverter_Heap_Overflow_RCE/unescapeShellcodeEncoder.py -------------------------------------------------------------------------------- /simple_trace.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/n3k/misc_exploits_pocs/HEAD/simple_trace.py --------------------------------------------------------------------------------