windows-kernel-exploits Windows平台提权漏洞集合
☆24Jul 29, 2021Updated 4 years ago
Alternatives and similar repositories for windows-kernel-exploits
Users that are interested in windows-kernel-exploits are comparing it to the libraries listed below
Sorting:
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14May 23, 2020Updated 5 years ago
- find historical account IDs for specified twitter @ name using wayback machine captures☆25Oct 15, 2021Updated 4 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- ☆21Dec 1, 2019Updated 6 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Mattermost Plugin to clean your channels with /broom☆12Mar 13, 2025Updated last year
- Modify data structures in the Windows kernel, hiding processes by PID☆16Oct 29, 2017Updated 8 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29May 18, 2018Updated 7 years ago
- ☆15Dec 20, 2022Updated 3 years ago
- ☆34Mar 7, 2020Updated 6 years ago
- quality of life☆19Dec 24, 2019Updated 6 years ago
- Detect credit card exposures with Bro☆15Nov 12, 2023Updated 2 years ago
- Exploit Exercises for Security Researchers (arm, x86...)☆13May 10, 2019Updated 6 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 4 years ago
- exploitation of php use-after-free vulnerabilities on 64 bit systems | poc||gtfo☆12Apr 8, 2015Updated 10 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago
- SITCON 2025 議程簡報 - 前端特效:不都國中數學☆16Jul 6, 2025Updated 8 months ago
- Metasploit Framework☆31Jan 30, 2020Updated 6 years ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- This IDA Python plugin is intended to get you started creating IDA Plugins with Python, recognize the importance of deobfuscating strings…☆30Dec 16, 2020Updated 5 years ago
- Simple Aggressor Scripts for Cobalt Strike☆13Sep 24, 2020Updated 5 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- ipinfo.io from the command line☆18Oct 22, 2019Updated 6 years ago
- brocon-15 scripts☆13Apr 3, 2017Updated 8 years ago
- Proof of concept of VMSA-2017-0012☆41Jul 27, 2017Updated 8 years ago
- OutCHM就是可以生成一个CHM啦。☆14Nov 9, 2016Updated 9 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Sep 9, 2020Updated 5 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆26Feb 19, 2021Updated 5 years ago
- Asynchronous public DNS auditing tool☆11May 22, 2023Updated 2 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- POC and exploitation of vulnerabilities☆91Mar 22, 2022Updated 4 years ago
- Malware Machine Learning☆27Apr 1, 2018Updated 7 years ago
- Tasteless CTF 2019☆20Nov 6, 2019Updated 6 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Updated this week
- ☆17Dec 1, 2019Updated 6 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago