DavidBuchanan314 / pwn-mbrLinks
A simple MBR hijack demonstration
☆180Updated 3 years ago
Alternatives and similar repositories for pwn-mbr
Users that are interested in pwn-mbr are comparing it to the libraries listed below
Sorting:
- Hardcore corruption of my execve() vulnerability in WSL☆216Updated 7 years ago
- Windows XP 32-Bit Bootkit☆145Updated 10 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆170Updated 9 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆146Updated 8 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆184Updated 6 years ago
- A novel technique to hide code from debuggers & disassemblers☆159Updated last year
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆264Updated 8 years ago
- Implementation of the SMM rootkit "The Watcher"☆130Updated 3 years ago
- Cross Architecture Shellcode in C☆206Updated 9 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆79Updated 7 years ago
- ☆137Updated 4 years ago
- PEI stage backdoor for UEFI compatible firmware☆228Updated 4 years ago
- C++-based shellcode builder☆115Updated 5 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆118Updated last year
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Updated 9 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆406Updated 11 years ago
- Scripts for disassembling VBScript p-code in the memory to aid in exploits analysis☆86Updated 3 years ago
- Devestating and awesome Linux X86_64 ELF Virus☆234Updated 3 years ago
- windows kernel vulnerability found by me☆90Updated 8 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆85Updated 9 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Updated 7 years ago
- An attempt at Process Doppelgänging☆181Updated 7 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Updated 4 years ago
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆100Updated 9 years ago
- Tools, documentation and scripts to move projects from IDA to R2 and viceversa☆135Updated 6 years ago
- ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)☆138Updated 7 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Updated 11 years ago
- Content from presentation at BHUSA 2017☆180Updated 8 years ago