DownWithUp / CVE-Stockpile
Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.
☆47Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-Stockpile
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 6 years ago
- ☆10Updated 2 years ago
- Super IOCTL Basic Fuzzer☆14Updated 5 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆94Updated 4 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆36Updated 6 years ago
- ☆44Updated 4 years ago
- ☆22Updated 4 years ago
- ☆33Updated last year
- Command like tool to print mitigation flags for running processes in a memory dump☆44Updated 4 years ago
- ☆49Updated 5 years ago
- ☆12Updated 4 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆103Updated 4 years ago
- ☆31Updated 4 years ago
- Windows syscall fuzzer that I used in 2017 & 2018. Not much to say about it but maybe helpful to someone. At least syscall information it…☆19Updated 4 years ago
- ☆38Updated 4 years ago
- ☆39Updated 3 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆14Updated 4 years ago
- Analysis of VBS exploit CVE-2018-8174☆30Updated 6 years ago
- Public repository for HEVD exploits☆20Updated 6 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆34Updated 6 years ago
- My conference presentations and publications☆26Updated 2 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆26Updated 7 years ago