20urc3 / AplosLinks
Aplos an extremely simple fuzzer for Windows binaries.
☆69Updated 6 months ago
Alternatives and similar repositories for Aplos
Users that are interested in Aplos are comparing it to the libraries listed below
Sorting:
- ☆49Updated 4 months ago
- CVE-2024-30090 - LPE PoC☆107Updated 10 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 7 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆114Updated 11 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- ☆105Updated last year
- ☆80Updated last week
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆136Updated last year
- ☆37Updated 8 months ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- A few examples of how to trap virtual memory access on Windows.☆33Updated 8 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆99Updated last year
- Analysis of the vulnerability☆51Updated last year
- ☆64Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆152Updated 2 weeks ago
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆59Updated 4 months ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆51Updated 2 months ago
- Recon 2023 slides and code☆79Updated 2 years ago
- ☆59Updated last year
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆94Updated 10 months ago
- A more reliable way of resolving syscall numbers in Windows☆53Updated last year
- Binary Exploitation Phrack CTF Challenge☆85Updated this week
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated 10 months ago
- Proof-of-Concept for CVE-2024-26218☆52Updated last year
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆118Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- Slide of my conference presentations☆14Updated 11 months ago
- Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)☆35Updated 2 months ago