20urc3 / AplosLinks
Aplos an extremely simple fuzzer for Windows binaries.
☆67Updated 8 months ago
Alternatives and similar repositories for Aplos
Users that are interested in Aplos are comparing it to the libraries listed below
Sorting:
- ☆50Updated 6 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 9 months ago
- ☆83Updated 2 months ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆117Updated last year
- CVE-2024-30090 - LPE PoC☆108Updated last year
- ☆105Updated last year
- ☆64Updated last year
- ☆39Updated 10 months ago
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆61Updated 6 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- Recon 2023 slides and code☆80Updated 2 years ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆158Updated last month
- A few examples of how to trap virtual memory access on Windows.☆34Updated 10 months ago
- LPE exploit for CVE-2023-36802☆24Updated 2 years ago
- Payload Obfuscation for Red Teams workshop materials☆64Updated this week
- Analysis of the vulnerability☆51Updated last year
- A more reliable way of resolving syscall numbers in Windows☆52Updated last year
- Some of my windows kernel exploits for learning purposes☆131Updated 3 years ago
- Proof-of-Concept for CVE-2024-26218☆54Updated last year
- ☆63Updated last year
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆105Updated last year
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆97Updated last year
- Slide of my conference presentations☆14Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated 2 years ago
- ☆74Updated last year
- ☆108Updated 11 months ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆146Updated last year
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆39Updated 8 months ago