Python solutions for the HackSysTeam Extreme Vulnerable Driver
☆152Mar 20, 2021Updated 5 years ago
Alternatives and similar repositories for HEVD-Python-Solutions
Users that are interested in HEVD-Python-Solutions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆143Apr 21, 2017Updated 9 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- Exploit primitives for PowerShell☆435Mar 25, 2018Updated 8 years ago
- windows kernel vulnerability found by me☆88Aug 28, 2017Updated 8 years ago
- ☆35Sep 18, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆416Jan 2, 2020Updated 6 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆265Jul 6, 2017Updated 8 years ago
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆102Jul 26, 2016Updated 9 years ago
- Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)☆140Jan 4, 2017Updated 9 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆439Aug 22, 2018Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- PoC ActiveX SVG Document Execution☆19Nov 8, 2018Updated 7 years ago
- ☆62Apr 13, 2017Updated 9 years ago
- ☆164May 18, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- plugin of ida with pin☆48Jan 25, 2021Updated 5 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 11 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆145Jul 30, 2017Updated 8 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆347May 5, 2019Updated 7 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- Teaching old shellcode new tricks☆210Aug 1, 2017Updated 8 years ago
- Black Hat 2016 Slides, Paper and Code☆83Aug 10, 2016Updated 9 years ago
- Content from presentation at BHUSA 2017☆178Jul 27, 2017Updated 8 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆13Jun 13, 2017Updated 8 years ago
- ☆138Jul 13, 2017Updated 8 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 9 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆49Jun 27, 2016Updated 9 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆639Jul 7, 2017Updated 8 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Oct 17, 2017Updated 8 years ago
- ☆520Feb 22, 2020Updated 6 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Detect, analyze and uniquely identify crashes in Windows applications☆523May 23, 2025Updated 11 months ago
- ☆406Mar 1, 2017Updated 9 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆725Nov 19, 2017Updated 8 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 9 years ago
- ☆30Jan 4, 2018Updated 8 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago