Skip to content

Instantly share code, notes, and snippets.

View o0xmuhe's full-sized avatar
🐦
咕咕咕

o0xmuhe o0xmuhe

🐦
咕咕咕
View GitHub Profile
@o0xmuhe
o0xmuhe / ip6_expl_poc.c
Created March 23, 2021 05:50 — forked from Cryptogenic/ip6_expl_poc.c
Kernel exploit POC (Proof-of-Concept) for IP6_EXTHDR_CHECK double free (CVE-2020-9892). Interleaves with multi-threads for code exec. Mainly a reference for PS4 implementation.
/*
* IP6_EXTHDR_CHECK Double Free (CVE-2020-9892) Exploit PoC for FreeBSD 9.0
* https://github.com/google/security-research/security/advisories/GHSA-gxcr-cw4q-9q78
* -
* Bug credit: Andy Nguyen (@theflow0)
* Exploit credit: @SpecterDev, @tihmstar
* Thanks: @sleirsgoevy, @littlelailo, flatz (@flat_z), @balika011
* -
* Build: gcc -o expl ip6_expl_poc.c -pthread
* -
@o0xmuhe
o0xmuhe / nitro_reader_jsapi.rb
Created July 26, 2017 02:23
A z̶e̶r̶o̶ one-day exploit for Nitro Reader and Nitro Reader Pro
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking