22 results for “topic:seh”
Some exploits, which I’ve created during my OSCE preparation.
Structured Exception Handling (SEH) for Rust
Moved: https://codeberg.org/koutheir/binary-security-check
Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.
A tutorial on writing unhandled exception filters, WinDbg extensions, and how exceptions on Windows work.
File Capability Extractor
Manually implement Structured Exception Handling a.k.a SEH for Delphi
Software Enigineer Portfolio using next js
Structured Exception Handling - A simple implementation, but cross-platform.
A robust, feature-rich manual map DLL injection library for Windows x64 processes. This implementation provides stealthy DLL injection with automatic cleanup capabilities, SEH support, and memory wiping for anti-detection.
Cross-platform catching all system errors, structured exceptions, signals. Converting to std::exception. Using original C++ try-catch syntax.
A demo of a Structured/Vectored Exception Handler hook using the Debug Registers to trigger an exception.
A demo of a Structured/Vectored Exception Handler hook using a Page Guard Exception.
Moved to codeberg
Simple Event Handler in C++
My Exploit Archive :)
This repository is dedicated to the vulnserver app exploitation. Each folder contain two files, the final exploit PoC.py and the fuzzing command file.
Convert numbers to unsigned 32-bit hex and get the Windows exception exit code name.
Here is a collection of buffer overflow (stack & SEH) I reproduced in Python and finally ported in Metasploit modules
CVE-2019-18655 metasploit module. SEH based buffer overflow in file sharing wizard app v.1.5.0.
Detect manually mapped modules in Windows processes using runtime memory scanning, entropy analysis, and PE structure inspection for security research.
A small repo where I will store all my exploits and all associated stuff for the vulnserver application.