0xDivyanshu-new / CVE-2023-29360Links
POC for CVE-2023-29360
☆12Updated last year
Alternatives and similar repositories for CVE-2023-29360
Users that are interested in CVE-2023-29360 are comparing it to the libraries listed below
Sorting:
- ☆20Updated 8 months ago
- Remove WPP calls from hexrays decompiled code☆53Updated 5 months ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆35Updated 5 months ago
- ☆61Updated 2 years ago
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆41Updated 3 months ago
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆23Updated 3 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Updated 3 years ago
- This repo contains EXPs about Vulnerable Windows Driver☆47Updated last year
- A PoC tool for exploiting leaked process and thread handles☆32Updated last year
- A simple but useful project maybe help you reverse Windows.☆39Updated last year
- LPE exploit for CVE-2023-36802☆23Updated last year
- LPE of CVE-2024-26230☆24Updated last year
- Repo with different exploits & PoCs☆64Updated 4 months ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆27Updated 3 months ago
- ☆32Updated last year
- ☆40Updated 2 years ago
- poc code for CVE-2024-38080☆29Updated last year
- A few examples of how to trap virtual memory access on Windows.☆34Updated 9 months ago
- My try to implement a virtual CPU in C☆19Updated last year
- Analysis of the vulnerability☆51Updated last year
- POC For CVE-2022-24483☆14Updated 3 years ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆51Updated 3 months ago
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.☆31Updated 3 years ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆37Updated last month
- A VMBR (Virtual-Machine Based Rootkit) which runs a guest OS and sends the attacker its data☆28Updated last year
- ☆28Updated 10 months ago
- CVE-2021-36955☆14Updated 2 years ago
- ☆114Updated 3 years ago
- ☆14Updated 3 years ago
- ☆29Updated last year