AzAgarampur / CorsairLLeakView external linksLinks
Corsair LL Access driver abuse
☆24Apr 16, 2021Updated 4 years ago
Alternatives and similar repositories for CorsairLLeak
Users that are interested in CorsairLLeak are comparing it to the libraries listed below
Sorting:
- ☆25May 21, 2021Updated 4 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆96Dec 20, 2021Updated 4 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- NT AUTHORITY\SYSTEM☆43Jul 8, 2020Updated 5 years ago
- C Header Only Library for Virii☆12Nov 17, 2020Updated 5 years ago
- A fork of https://github.com/SafeBreach-Labs/pinjectra with a practical implementation of Stack Bombing☆29Oct 22, 2020Updated 5 years ago
- A simple C++ driver base with KD data block☆11Jun 25, 2022Updated 3 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- Windows Server 2K3 NT 5☆12Apr 14, 2021Updated 4 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- Windows Server 2K3 NT 5☆12Apr 17, 2021Updated 4 years ago
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- x64 Windows implementation of virtual-address to physical-address translation☆46Jun 3, 2021Updated 4 years ago
- A slightly safer io access library☆14Sep 20, 2021Updated 4 years ago
- Windows system spy for Mouse, Keyboard and Gamepad(Joystick).☆15Jul 6, 2022Updated 3 years ago
- collection of code snippets,windbg,python scripts and resources☆14Jul 11, 2022Updated 3 years ago
- Quarantine bypass and RCE vulnerability in Sketch (proof-of-concept)☆13Nov 22, 2021Updated 4 years ago
- Toy scripts for playing with WinDbg JS API☆243Jul 8, 2024Updated last year
- ☆130Sep 14, 2020Updated 5 years ago
- A comprehensive list of guides, handbooks, scripts, and fully featured apps required to initiate Hyper-Jacking Attacks (Theft of a Virtru…☆15Apr 1, 2018Updated 7 years ago
- A basic PE parser for 32-bit Windows executables.☆14May 24, 2017Updated 8 years ago
- POC for CVE-2021-1699☆17Mar 31, 2021Updated 4 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- Abusing RtlAdjustPrivilege and NtSetInformationProcess to cause a BSOD from usermode☆20Sep 1, 2022Updated 3 years ago
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Sep 12, 2019Updated 6 years ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆42Apr 14, 2024Updated last year
- Various tools, PoCs and experiments related to my blog at https://www.forrest-orr.net/☆41Jul 22, 2021Updated 4 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆36Jan 12, 2022Updated 4 years ago
- d☆14Sep 5, 2025Updated 5 months ago
- ☆14Jun 21, 2020Updated 5 years ago
- a dumb rpm/wpm example driver☆15Jun 7, 2021Updated 4 years ago
- An opensource API hooking framework☆22Jan 3, 2020Updated 6 years ago
- An example code of CiGetCertPublisherName☆17Mar 24, 2022Updated 3 years ago
- ☆15Mar 13, 2023Updated 2 years ago
- Binary Ninja plugin to perform automated analysis of Windows drivers☆20Aug 8, 2019Updated 6 years ago