windows-kernel-exploits Windows平台提权漏洞集合
☆23Jul 29, 2021Updated 4 years ago
Alternatives and similar repositories for windows-kernel-exploits
Users that are interested in windows-kernel-exploits are comparing it to the libraries listed below
Sorting:
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14May 23, 2020Updated 5 years ago
- Malware Machine Learning☆27Apr 1, 2018Updated 7 years ago
- ☆21Dec 1, 2019Updated 6 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆25Feb 19, 2021Updated 5 years ago
- Metasploit Framework☆31Jan 30, 2020Updated 6 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- ☆34Mar 7, 2020Updated 5 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Decompiled source code of GhostCtrl. It’s not the original source code☆10Jul 26, 2017Updated 8 years ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Feb 7, 2026Updated 3 weeks ago
- ☆10Aug 9, 2024Updated last year
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- Proof of concept of VMSA-2017-0012☆41Jul 27, 2017Updated 8 years ago
- A host based IDS written in C# Targetted at Metasploit☆44Nov 18, 2013Updated 12 years ago
- WinDbg plugin to trace module transitions from a debugged driver.☆40Dec 22, 2025Updated 2 months ago
- Accessibility UX checklist to serve as a method for designers and developers to assess the WCAG compliance of their work.☆16Mar 30, 2023Updated 2 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- PHP wrapper functions for interfacing with the Nessus V6.x API☆15Feb 14, 2017Updated 9 years ago
- Crafter CMS documentation☆11Feb 19, 2026Updated last week
- API for data transmission and retrieval from Monero applications through the Microsoft .NET Framework☆10Jan 16, 2017Updated 9 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- ☆14Aug 22, 2023Updated 2 years ago
- ☆11Sep 8, 2025Updated 5 months ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Block-based software vulnerability fuzzing framework☆49Dec 22, 2018Updated 7 years ago
- The implementation of sdhash, the algorithm to calculate similarity digests, rewritten in pure go language 🐹☆10Jan 17, 2021Updated 5 years ago
- ☆10Feb 9, 2018Updated 8 years ago
- ☆11Feb 10, 2026Updated 2 weeks ago
- ☆10Jul 28, 2021Updated 4 years ago
- This is a script that accesses subreddits and downloads media based on keywords from the submission title.☆13Mar 9, 2020Updated 5 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- windows Local privilege escalation for xp sp3+ (x86/x64)☆12Oct 26, 2017Updated 8 years ago
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- Microbrowser for Microcontroller☆12Aug 2, 2020Updated 5 years ago
- 3D Visualisation of Sensor Information on Google Android Platform☆11Mar 17, 2015Updated 10 years ago