CyberMonitor / windows-kernel-exploitsLinks
windows-kernel-exploits Windows平台提权漏洞集合
☆23Updated 4 years ago
Alternatives and similar repositories for windows-kernel-exploits
Users that are interested in windows-kernel-exploits are comparing it to the libraries listed below
Sorting:
- Proof-of-Concept exploits for CVE-2017-11882☆41Updated 8 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Updated 6 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 6 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- ☆43Updated 7 years ago
- A Generic Windows Memory Scraping Tool☆71Updated 8 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆67Updated 8 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- Proof of Concept's provided by Source Incite☆37Updated 8 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated 2 years ago
- Telsy CTI Research Team☆57Updated 5 years ago
- ☆78Updated 8 years ago
- CVE-2017-8570 Exploit☆21Updated 8 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- CVE-2019-0708 - BlueKeep (RDP)☆40Updated 5 years ago
- UAC 0Day all day!☆57Updated 8 years ago
- Python script to automatically deobfuscate malware code☆59Updated 7 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Updated 12 years ago
- An example rootkit that gives a userland process root permissions☆78Updated 6 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆58Updated 8 years ago
- BlackHat Europe 2017 Slides☆25Updated 7 years ago
- A set of demos and a PowerShell module to interact with DotNetInterop.☆68Updated 7 years ago
- A repository of open source reports on different malware families used in targeted cyber intrusions ("APT").☆55Updated 10 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- API functions for Malware Research☆35Updated 6 years ago
- SilkETW & SilkService☆40Updated 6 years ago
- PoC ActiveX SVG Document Execution☆21Updated 7 years ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆55Updated last year
- UAC Bypass with mmc via alpc☆158Updated 6 years ago