VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advanced security protections like Intel CET and Control-Flow Guard (CFG) to achieve Remote Code Execution.
☆24Mar 16, 2025Updated last year
Alternatives and similar repositories for VirtualEXploiter
Users that are interested in VirtualEXploiter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A reverse/bind shell generator utility☆11Jul 22, 2024Updated last year
- ☆11Oct 17, 2024Updated last year
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆90Oct 6, 2020Updated 5 years ago
- A basic Secure Virtual Machine hypervisor☆27Feb 25, 2021Updated 5 years ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- HexRaysPyTools merged! (@NyaMisty @oopsmishap @Tim-Sobolev @OrbitOn-line)☆15Dec 15, 2025Updated 3 months ago
- ☆18Oct 15, 2024Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.☆79Aug 25, 2025Updated 7 months ago
- Abusing DDMA alongside Copy On Write for Cross Process Code Execution for a 3000$ Bug Bounty☆95Feb 1, 2026Updated last month
- ☆49Dec 21, 2025Updated 3 months ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 6 months ago
- A device-independent random number generator☆18Apr 27, 2024Updated last year
- A TCP implementation over a tun device☆13Nov 23, 2025Updated 4 months ago
- Repository for the DEF CON 33 talk: Kill Chain Reloaded☆82Aug 3, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Ai000-Rostam (Codename: Ritchie Blackmoore) is a penetration testing tool for windows infrastructure that has been developing by Ai000 Cy…☆10Jun 2, 2024Updated last year
- narly.js - print binary protections with Windbg JS (/SafeSEH, /GS, ASLR, etc.)☆15Nov 14, 2022Updated 3 years ago
- 存放投稿里的一些文件☆11Oct 31, 2020Updated 5 years ago
- ☆16Jan 2, 2025Updated last year
- An example of an external LLVM plugin module transform pass for the latest versions.☆14Oct 21, 2025Updated 5 months ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆32Dec 31, 2025Updated 2 months ago
- C/C++ single header library to determine the time in seconds that passed since the start of the current process, including everything tha…☆39Dec 25, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- LPE / RCE Exploits for various vulnerable "Bloatware" products☆87Aug 5, 2025Updated 7 months ago
- 无痕hook探测☆45Aug 6, 2025Updated 7 months ago
- Interprocess communication via a covert timing channel☆26Oct 24, 2025Updated 5 months ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- 从CTF比赛平台批量下载附件。A tool for downloading attachments in bulk from CTF events on platforms. [计划重新设计 Redesign planned]☆15Mar 13, 2026Updated 2 weeks ago
- ☆18Jun 10, 2025Updated 9 months ago
- 《C++反汇编与逆向分析技术揭秘》学习笔记☆12Jun 10, 2018Updated 7 years ago
- Example of building an application verifer DLL