Slide deck for DefCon Beijing
☆39May 15, 2018Updated 7 years ago
Alternatives and similar repositories for DefCon-Beijing-UAC
Users that are interested in DefCon-Beijing-UAC are comparing it to the libraries listed below
Sorting:
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Updated this week
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Feb 24, 2019Updated 7 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- 驱动层拦截web访问源码☆30Apr 2, 2018Updated 7 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- Post module for Metasploit to execute ELF in memory☆86Nov 23, 2018Updated 7 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Nov 10, 2018Updated 7 years ago
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 7 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- ☆164May 18, 2018Updated 7 years ago
- Windows device tree walker☆15Sep 19, 2018Updated 7 years ago
- ☆17Oct 15, 2017Updated 8 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE☆62Jun 1, 2023Updated 2 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- 漏洞复现记录☆11Jun 18, 2019Updated 6 years ago
- C++ wrapers to simplify working with the JsRT interface to the Chakra JavaScript engine.☆16Nov 16, 2015Updated 10 years ago
- PowerShell interpreter for unmanaged (non CLI) C++ projects☆16Jul 19, 2017Updated 8 years ago
- windows inlinehook R3 R0☆11Apr 11, 2018Updated 7 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- 基于WinDivert实现的一个包过滤与截断程序☆13Jul 22, 2018Updated 7 years ago
- A debugger for windows platform☆20Oct 31, 2018Updated 7 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- Secured network tunnel for two computers connection☆32Nov 13, 2020Updated 5 years ago
- A repository with simple projects created for testing/learning purpose☆46Dec 18, 2025Updated 2 months ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 7 years ago
- ☆14Feb 14, 2018Updated 8 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 6 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- cve-2019-0808-poc☆48Mar 25, 2019Updated 6 years ago
- ☆34Jul 28, 2018Updated 7 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- ☆349Mar 19, 2021Updated 4 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Feb 2, 2018Updated 8 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago