An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit
☆82Mar 9, 2017Updated 8 years ago
Alternatives and similar repositories for CVE-2016-7255
Users that are interested in CVE-2016-7255 are comparing it to the libraries listed below
Sorting:
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 10 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- ☆17Mar 3, 2016Updated 9 years ago
- A windbg extension, extracting token related contents☆41Dec 23, 2020Updated 5 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Simple library to spray the Windows Kernel Pool☆110Jan 6, 2020Updated 6 years ago
- ☆30May 23, 2017Updated 8 years ago
- CVE-2017-7269 回显PoC ,用于远程漏洞检测..☆89Oct 27, 2018Updated 7 years ago
- windows kernel vulnerability found by me☆90Aug 28, 2017Updated 8 years ago
- Hidden module/dll detector for windows apps☆15May 21, 2017Updated 8 years ago
- Detect the SCI in windows.☆11Mar 23, 2017Updated 8 years ago
- ☆17Oct 24, 2016Updated 9 years ago
- ☆22May 25, 2017Updated 8 years ago
- A hack for WolfTeam (FPS). Developed and commercialized many years ago.☆12Oct 29, 2017Updated 8 years ago
- WinPCAP for NDIS 6.x☆14Jun 24, 2019Updated 6 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- analyze the content of the pe file on windows, and shell(pack) function for windows drivers.☆11Nov 9, 2018Updated 7 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆16Oct 18, 2016Updated 9 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago
- ☆14Jun 27, 2017Updated 8 years ago
- WIP - Play with Intel VM Extensions☆23Jun 12, 2017Updated 8 years ago
- ☆27Apr 4, 2019Updated 6 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- an efficient yet easy to use network packet builder and parser☆11Jul 3, 2017Updated 8 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- A dns server that use to hijack other dns request in a wifi network for redirect to your custem http server ..☆20Jun 25, 2015Updated 10 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆59Jan 11, 2017Updated 9 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- Windows Kernel Driver - Create a driver device in TDI layer of windows kernel to capture network data packets☆36Jul 21, 2014Updated 11 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI☆42Feb 13, 2017Updated 9 years ago
- createfile☆50Oct 27, 2015Updated 10 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Mar 13, 2017Updated 8 years ago