Python solutions for the HackSysTeam Extreme Vulnerable Driver
☆153Mar 20, 2021Updated 5 years ago
Alternatives and similar repositories for HEVD-Python-Solutions
Users that are interested in HEVD-Python-Solutions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆143Apr 21, 2017Updated 8 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- Exploit primitives for PowerShell☆436Mar 25, 2018Updated 8 years ago
- windows kernel vulnerability found by me☆89Aug 28, 2017Updated 8 years ago
- ☆35Sep 18, 2015Updated 10 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆416Jan 2, 2020Updated 6 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆265Jul 6, 2017Updated 8 years ago
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆107Jul 26, 2016Updated 9 years ago
- Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)☆140Jan 4, 2017Updated 9 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆440Aug 22, 2018Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- ☆63Apr 13, 2017Updated 8 years ago
- ☆164May 18, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- plugin of ida with pin☆48Jan 25, 2021Updated 5 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆147Jul 30, 2017Updated 8 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆345May 5, 2019Updated 6 years ago
- Teaching old shellcode new tricks☆210Aug 1, 2017Updated 8 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- Black Hat 2016 Slides, Paper and Code☆83Aug 10, 2016Updated 9 years ago
- Content from presentation at BHUSA 2017☆179Jul 27, 2017Updated 8 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆13Jun 13, 2017Updated 8 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 9 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆635Jul 7, 2017Updated 8 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Oct 17, 2017Updated 8 years ago
- ☆522Feb 22, 2020Updated 6 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Detect, analyze and uniquely identify crashes in Windows applications☆522May 23, 2025Updated 10 months ago
- ☆407Mar 1, 2017Updated 9 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Nov 19, 2017Updated 8 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago