IOCTL-Flooder is a verbose tool designed to help with Windows driver fuzzing by brute forcing IOCTLs on loaded drivers. GetLastError is used to guess validity
☆11Aug 21, 2018Updated 7 years ago
Alternatives and similar repositories for IOCTL-Flooder
Users that are interested in IOCTL-Flooder are comparing it to the libraries listed below
Sorting:
- WhoCalls can query a directory of files, find the binaries, and search for a user specified Win API import. It and works with both 32-bit…☆18Jul 2, 2022Updated 3 years ago
- Super IOCTL Basic Fuzzer☆16Sep 22, 2019Updated 6 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- BoltWire v6.03 vulnerable to "Improper Access Control"☆13Oct 31, 2023Updated 2 years ago
- impersonate trustedinstaller by fiddling with tokens☆17Aug 30, 2021Updated 4 years ago
- Native Development Kit for Vista 64bit And Later, by me, Based on NDK Headers 1.0, by Alex Ionescu☆17Dec 6, 2015Updated 10 years ago
- A framework to fuzz Word Quick Fields☆20Jul 15, 2018Updated 7 years ago
- Bypass User Account Control by manipulating tokens☆35Nov 3, 2017Updated 8 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆23Jan 21, 2024Updated 2 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆126Jan 15, 2019Updated 7 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- Windows Kernel Drivers fuzzer☆378Mar 15, 2017Updated 8 years ago
- ☆19Jan 12, 2020Updated 6 years ago
- Build a Jekyll blog in minutes, without touching the command line.☆16Dec 6, 2018Updated 7 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Mar 22, 2017Updated 8 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- UI application that can compare PE images in memory or in raw PE file☆19Feb 17, 2014Updated 12 years ago
- Public repository for HEVD exploits☆19Jun 26, 2018Updated 7 years ago
- IRPT: The Art, Science, and Engineering of Windows driver fuzzing☆21Mar 26, 2021Updated 4 years ago
- Offline installation media (new version)☆22Jul 6, 2015Updated 10 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Aug 25, 2017Updated 8 years ago
- Minimalistic HTTP(S) client for the NT kernel☆62Dec 1, 2025Updated 3 months ago
- RCS Anonymizer☆20May 24, 2021Updated 4 years ago
- Monitor the textual data pasted into Windows clipboard☆29Nov 4, 2018Updated 7 years ago
- LPE exploit for CVE-2023-36802☆167Oct 10, 2023Updated 2 years ago
- MemoryHacker is a tool which can search for values on the target process!☆22Jul 21, 2016Updated 9 years ago
- Bypass using kernel driver (not finish).☆21Apr 30, 2023Updated 2 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated last month
- 逆向小红伞杀毒软件驱 动——avkmgr☆71Nov 27, 2017Updated 8 years ago
- x64 Driver written in FASM☆24May 18, 2017Updated 8 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆29Apr 6, 2022Updated 3 years ago
- An API Monitor based on Instrumentation☆43Dec 19, 2017Updated 8 years ago
- Static library and headers for linking your software with ntdll.dll☆37Dec 16, 2019Updated 6 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Sep 24, 2018Updated 7 years ago