0xDivyanshu-new / CVE-2023-29360Links
POC for CVE-2023-29360
☆12Updated last year
Alternatives and similar repositories for CVE-2023-29360
Users that are interested in CVE-2023-29360 are comparing it to the libraries listed below
Sorting:
- ☆21Updated 11 months ago
- Remove WPP calls from hexrays decompiled code☆54Updated 9 months ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Updated 3 years ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆68Updated 4 months ago
- ☆61Updated 2 years ago
- A simple but useful project maybe help you reverse Windows.☆41Updated last year
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆36Updated 8 months ago
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆25Updated 3 years ago
- This repo contains EXPs about Vulnerable Windows Driver☆47Updated last year
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆41Updated 7 months ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆28Updated 7 months ago
- ☆35Updated 2 years ago
- LPE of CVE-2024-26230☆23Updated last year
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.☆36Updated 3 years ago
- A PoC tool for exploiting leaked process and thread handles☆32Updated last year
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆38Updated 5 months ago
- poc code for CVE-2024-38080☆30Updated last year
- A few examples of how to trap virtual memory access on Windows.☆38Updated last year
- IAT-Obfuscation to make static analysis of executable harder.☆44Updated 4 years ago
- My try to implement a virtual CPU in C☆19Updated 2 years ago
- LPE exploit for CVE-2023-36802☆24Updated 2 years ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆38Updated 3 years ago
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆49Updated 2 years ago
- An example of how to use Microsoft Windows Warbird technology☆30Updated 2 years ago
- ☆10Updated 4 years ago
- ☆22Updated last year
- ☆117Updated 3 years ago
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆46Updated 3 years ago
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆61Updated 2 years ago
- A C++/Asm template for PIC/EXE/DLL malware☆24Updated 5 months ago