We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent 04454aa commit 2e7614dCopy full SHA for 2e7614d
MS15-061/README.md
@@ -0,0 +1,16 @@
1
+# MS15-061
2
+
3
+- Exploiting MS15-061 with reverse engineering Win32k.sys by
4
+- The exp was from [@Rootkitsmm](https://github.com/Rootkitsmm/MS15-061)
5
6
7
+Vulnerability reference:
8
+ * [MS15-061 ](https://technet.microsoft.com/en-us/library/security/ms15-061.aspx)
9
+ * [CVE-2015-1726](https://www.exploit-db.com/exploits/38269/)
10
11
12
+### Links
13
14
+* [利用 MS15-061 Windows 内核释放后重用漏洞](https://github.com/LibreCrops/translation-zh_CN/blob/master/source/ms-15-061.rst)
15
16
0 commit comments