x64 Windows Exploit Development
☆116Aug 24, 2024Updated last year
Alternatives and similar repositories for Z0FCourse_ExploitDevelopment
Users that are interested in Z0FCourse_ExploitDevelopment are comparing it to the libraries listed below
Sorting:
- Penetration testing course by Z0F.☆52Oct 6, 2021Updated 4 years ago
- Code that can be used as a reference, library, or inspiration for hacking Windows memory.☆53May 1, 2020Updated 5 years ago
- Reverse engineering focusing on x64 Windows.☆5,611Sep 10, 2025Updated 5 months ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65May 31, 2020Updated 5 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Aug 4, 2021Updated 4 years ago
- Red Team C2 and Post Exploitation code☆35Jul 8, 2025Updated 7 months ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- An Android SSL Pinning Remover tool for Security research and Bug Bounty☆43Jun 1, 2023Updated 2 years ago
- ☆11May 17, 2023Updated 2 years ago
- [Not Another DLL Injector] - a simple, all purpose DLL injector for x64 and x86☆12Jul 4, 2019Updated 6 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- 🧿Join your two exe files☆11Jul 14, 2020Updated 5 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- CVE-2020-3452 exploit☆24Aug 1, 2020Updated 5 years ago
- CVE-2019-0708 - BlueKeep (RDP)☆40Jun 14, 2020Updated 5 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Jun 9, 2022Updated 3 years ago
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Mar 23, 2025Updated 11 months ago
- Win32 PE Anti-RE and Anti-debugging Framework☆13May 14, 2019Updated 6 years ago
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- ☆18Feb 19, 2025Updated last year
- A simple XSS finding tool☆110Nov 9, 2018Updated 7 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Feb 24, 2022Updated 4 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆94Jun 28, 2025Updated 8 months ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Sep 29, 2022Updated 3 years ago
- 👽 Exploits written for research purposes.☆11Nov 15, 2021Updated 4 years ago
- This changes the style of Burp Suite's Repeater tabs to help the testers☆29Jul 3, 2019Updated 6 years ago
- PoC for detecting and dumping process hollowing code injection☆52Oct 23, 2018Updated 7 years ago
- ☆20Jul 9, 2019Updated 6 years ago
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Jun 12, 2019Updated 6 years ago
- Simple TPM utils in Python for generating random numbers & RSA keys☆20Jan 15, 2017Updated 9 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆92Dec 6, 2018Updated 7 years ago
- A utility to use the usermode shellcode from the DOUBLEPULSAR payload to reflectively load an arbitrary DLL into another process, for use…☆123Jun 27, 2017Updated 8 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Dec 29, 2017Updated 8 years ago
- ☆14Aug 31, 2021Updated 4 years ago