Name: Douglas C. Smith
Type: User
Company: Juniper Travel Technology
Bio: Information Security Consultant | Red Teaming | Penetration Tester
Blog: squirrel.lu
wtf : A distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows,
windbg-scripts : A collection of JavaScript debugger extensions for WinDbg,
kdmp-parser / udmp-parser : C++ libraries to parse Windows kernel and usermode dumps (udmp-parser-rs / kdmp-parser-rs for Rust crates),
🔮 clairvoyance : Visualize the virtual address space of a Windows process on a Hilbert curve,
symbolizer-rs : A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries,
SiC : Enumerate user mode shared memory mappings on Windows,
KEPaboo : Neutralize KEPServerEX anti-debugging techniques,
rp-bf.rs : A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump,
Various CVE PoCs for tcpip.sys
(CVE-2021-24086 ), http.sys
(CVE-2021-31166 ), Hyper-V (CVE-2021-28476 ), Realtek's RTKVHD64.sys
driver (CVE-2021-32537 ) and the Mozilla browser (CVE-2022-28281 ),
Modern Debugging with WinDbg Preview : Workshop that @hugsy and I ran during Defcon 27.
Paracosme : Zero-click remote memory corruption exploit that compromises ICONICS Genesis64 (Pwn2Own Miami 2022),
Longue vue : Over-the-web remote compromise exploit chain for NETGEAR DGND3700v2 devices,
Zenith : Remote kernel exploit for the TP-Link AC1750 Smart Wi-Fi Router (Pwn2Own Austin 2021),
Pwn2Own Miami 2023 : Writeups/PoCs for bugs I found while preparing for Pwn2Own Miami 2023 targeting UaGateway in the OPC UA Server category,
CVE-2019-11708 : Full chain for CVE-2019-11708 & CVE-2019-9810,
CVE-2019-9810 : RCE exploit for Firefox on Windows.
Douglas C. Smith's Projects