This is proof of concept code that demonstrates the Microsoft Windows kernel (Intel/x64) SYSRET vulnerability as described in MS12-042. The shellcode disables code signing and will grant NT SYSTEM privileges to a specified application or already running process.
55e5a8e72dbb887b38dad0ce6c7bebe03b8466705cf04ce1a1a8c9406a8c4db3
Adobe Reader X Atom Type Confusion vulnerability exploit. Versions prior to 10.1 are affected.
2033f50cee77bc7f1fa1709b3584c486872bb3fd662c3debbf685bbbeac65b4f
This is a whitepaper called The Arashi (A.K.A Storm). It discusses ASLR/DEP bypass techniques.
dfa912b70bb400100b503c7a03da6c98181c89c6c0691fda5e22af5afb3f5a95
MS Office 2010 RTF header stack overflow vulnerability exploit.
588a0fa3c54b92278c6cc9362ccb9c22e758bc06d2add63b51f46ae7e2a7878a
DjVu Active-X Control version 3.0 ImageURL property overflow exploit.
2d202aea26e136bc9b6a95fe616e54593e44ed8810f2d9850e0defcb7b4a62b4
PowerTCP FTP module multiple technique exploit using SEH overwrite and heapspray.
9d48b43ea454d0c15cc86e7fa405f6e1abbd72ea2fdf81dcfef1a6e8563b3330
Whitepaper entitled Detecting and Exploiting Vulnerabilities in ActiveX Controls. Written in Farsi.
a55486b2ef8323dff122d471481f484a8d72623c271a349cd0b318f55b96ca82