Pinned Repositories
acefile
POC of https://research.checkpoint.com/extracting-code-execution-from-winrar/
AFL
american fuzzy lop - a security-oriented fuzzer
agamotto
Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints
aksp
Another kernel self protection
android-vuln
安卓内核提权漏洞分析
BlueKeep
Proof of concept for CVE-2019-0708
CVE-2019-0803
Win32k Elevation of Privilege Poc
CVE-2020-8617
PoC for CVE-2020-8617 (BIND)
CVE-2021-28476
PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.
diffy
boo0m's Repositories
boo0m/acefile
POC of https://research.checkpoint.com/extracting-code-execution-from-winrar/
boo0m/AFL
american fuzzy lop - a security-oriented fuzzer
boo0m/agamotto
Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints
boo0m/aksp
Another kernel self protection
boo0m/android-vuln
安卓内核提权漏洞分析
boo0m/BlueKeep
Proof of concept for CVE-2019-0708
boo0m/CVE-2019-0803
Win32k Elevation of Privilege Poc
boo0m/CVE-2020-8617
PoC for CVE-2020-8617 (BIND)
boo0m/CVE-2021-28476
PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.
boo0m/documentation
Kata Containers version 1.x documentation (for version 2.x see https://github.com/kata-containers/kata-containers).
boo0m/hAFL1
boo0m/hyperv_local_dos_poc
Microsoft Hyper-V DoS proof-of-concept code
boo0m/hypervisor_exploit_templates
Some notes + templates that you can use in your hypervisor research, either for full exploits, or to verify / falsify any assumptions you may make while auditing code.
boo0m/Issue-198327
A Webkit RCE exploit and an SBX bug
boo0m/learn-kvm
Qemu KVM(Kernel Virtual Machine)学习笔记
boo0m/p0tools
Project Zero Docs and Tools
boo0m/ps4jb
PS4 6.72 jailbreak
boo0m/qemu
Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignored. Please only use release tarballs from the QEMU website.
boo0m/redis-rce
Redis 4.x/5.x RCE
boo0m/scavenger
QEMU escape code
boo0m/Scripts_QX
boo0m/sploits
PoC
boo0m/Squirrel
boo0m/stateafl
StateAFL: A Greybox Fuzzer for Stateful Network Servers
boo0m/trivy
A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI
boo0m/Vulnerabilities
boo0m/windows-XP-SP1
网上泄露的Windows XP SP1 source code
boo0m/wool_scripts
收集一些QuantumultX、Loon、Surge、ShadowRocket的配置与脚本,去广告合集。不止有QuantumultX脚本!
boo0m/wtf
wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows.
boo0m/zmhs_qx