D4stiny / ExceptionOrientedProgramming
Abusing exceptions for code execution.
☆107Updated last year
Related projects ⓘ
Alternatives and complementary repositories for ExceptionOrientedProgramming
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆85Updated 2 years ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆115Updated 2 months ago
- The Windbg extension that implements commands helpful to study Hyper-V on Intel processors.☆130Updated last month
- Finding Truth in the Shadows☆84Updated last year
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆221Updated 2 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆93Updated last year
- A journal for $6,000 Riot Vanguard bounty.☆57Updated last year
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆73Updated 3 years ago
- A kernel vulnerability used to achieve arbitrary read-write on Windows prior to July 2022☆105Updated last year
- Report and exploit of CVE-2023-36427☆87Updated 11 months ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆89Updated 3 years ago
- ☆131Updated last year
- Resolve DOS MZ executable symbols at runtime☆93Updated 3 years ago
- ☆82Updated 5 months ago
- Windows Kernel Programming Experiments☆78Updated 2 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆123Updated 2 years ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆84Updated last month
- ☆65Updated last year
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆163Updated 10 months ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆69Updated last year
- Detours implementation (x64/x86) which used only ntdll import☆88Updated 5 months ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆112Updated 6 months ago
- ☆154Updated 3 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆110Updated 3 years ago
- Writeups for CTF challenges☆30Updated last year
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆237Updated 2 years ago
- ☆98Updated 2 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆226Updated 3 years ago
- uefi diskless persistence technique + OVMF secureboot bypass☆52Updated 6 months ago