Python solutions for the HackSysTeam Extreme Vulnerable Driver
☆152Mar 20, 2021Updated 4 years ago
Alternatives and similar repositories for HEVD-Python-Solutions
Users that are interested in HEVD-Python-Solutions are comparing it to the libraries listed below
Sorting:
- ☆142Apr 21, 2017Updated 8 years ago
- Exploit primitives for PowerShell☆437Mar 25, 2018Updated 7 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆109Jul 26, 2016Updated 9 years ago
- windows kernel vulnerability found by me☆90Aug 28, 2017Updated 8 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆415Jan 2, 2020Updated 6 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆437Aug 22, 2018Updated 7 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆148Jul 30, 2017Updated 8 years ago
- ☆164May 18, 2018Updated 7 years ago
- ☆63Apr 13, 2017Updated 8 years ago
- ☆35Sep 18, 2015Updated 10 years ago
- Teaching old shellcode new tricks☆209Aug 1, 2017Updated 8 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- plugin of ida with pin☆48Jan 25, 2021Updated 5 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Nov 28, 2017Updated 8 years ago
- Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)☆140Jan 4, 2017Updated 9 years ago
- Content from presentation at BHUSA 2017☆180Jul 27, 2017Updated 8 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆345May 5, 2019Updated 6 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- ☆523Feb 22, 2020Updated 6 years ago
- ☆190Oct 25, 2017Updated 8 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 6 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Nov 19, 2017Updated 8 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Oct 17, 2017Updated 8 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆521May 23, 2025Updated 9 months ago
- Black Hat 2016 Slides, Paper and Code☆83Aug 10, 2016Updated 9 years ago