fkie-cad/cwe_checker: cwe_checker finds vulnerable patterns in binary executablescwe_checker finds vulnerable patterns in binary executables - fkie-cad/cwe_checker#vulnerability#vulnerability-scanner#code-analysis#binary-analysis#binary-exploits·github.com·Aug 19, 2025fkie-cad/cwe_checker: cwe_checker finds vulnerable patterns in binary executables
FuzzySecurity | Windows Hacking Tutorialsnull#binary-exploits#windows-exploits#exploits·fuzzysecurity.com·Jan 20, 2023FuzzySecurity | Windows Hacking Tutorials
Heap Overflow Exploitation on Windows 10 Explained | Rapid7 BlogHeap corruption can be a scary topic. In this post, we go through a basic example of a heap overflow on Windows 10.#binary-exploits#windows-exploits#exploits·rapid7.com·Jan 20, 2023Heap Overflow Exploitation on Windows 10 Explained | Rapid7 Blog
Smbleedingghost writeup chaining smbleed cve 2020 1206 with smbghost#binary-exploits#windows-exploits#exploits·blog.zecops.com·Jan 19, 2023Smbleedingghost writeup chaining smbleed cve 2020 1206 with smbghost
CVE-2021-31985: Exploiting the Windows Defender AsProtect Heap Overflow Vulnerability#binary-exploits#windows-exploits#exploits·pixiepointsecurity.com·Jan 19, 2023CVE-2021-31985: Exploiting the Windows Defender AsProtect Heap Overflow Vulnerability
"I'll ask your body": SMBGhost pre-auth RCE abusing Direct Memory Access structsPosted by hugeh0ge, Ricerca Security NOTE: We have decided to make our PoC exclusively available to our customers to avoid abuse by scr...#binary-exploits#windows-exploits#exploits·ricercasecurity.blogspot.com·Jan 19, 2023"I'll ask your body": SMBGhost pre-auth RCE abusing Direct Memory Access structs