Software Exploitation
/$$$$$$$$ /$$ /$$ /$$ /$$ /$$
| $$_____/ | $$ |__/ | $$ | $$ |__/
| $$ /$$ /$$ /$$$$$$ | $$ /$$$$$$ /$$ /$$$$$$ /$$$$$$ /$$$$$$ /$$ /$$$$$$ /$$$$$$$
| $$$$$ | $$ /$$/ /$$__ $$| $$ /$$__ $$| $$|_ $$_/ |____ $$|_ $$_/ | $$ /$$__ $$| $$__ $$
| $$__/ \ $$$$/ | $$ \ $$| $$| $$ \ $$| $$ | $$ /$$$$$$$ | $$ | $$| $$ \ $$| $$ \ $$
| $$ >$$ $$ | $$ | $$| $$| $$ | $$| $$ | $$ /$$ /$$__ $$ | $$ /$$| $$| $$ | $$| $$ | $$
| $$$$$$$$ /$$/\ $$| $$$$$$$/| $$| $$$$$$/| $$ | $$$$/| $$$$$$$ | $$$$/| $$| $$$$$$/| $$ | $$
|________/|__/ \__/| $$____/ |__/ \______/ |__/ \___/ \_______/ \___/ |__/ \______/ |__/ |__/
| $$
| $$
|__/
Copyright (C) 2010-2015 HackSys Team
This repository will hold the exploits for the kernel and user mode vulnerabilities.
Author : Ashfaq Ansari
Contact: ashfaq_ansari1989[at]hotmail.com
Website: http://hacksys.vfreaks.com