Python solutions for the HackSysTeam Extreme Vulnerable Driver
☆153Mar 20, 2021Updated 5 years ago
Alternatives and similar repositories for HEVD-Python-Solutions
Users that are interested in HEVD-Python-Solutions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆143Apr 21, 2017Updated 9 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- Exploit primitives for PowerShell☆435Mar 25, 2018Updated 8 years ago
- windows kernel vulnerability found by me☆89Aug 28, 2017Updated 8 years ago
- ☆35Sep 18, 2015Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆416Jan 2, 2020Updated 6 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆265Jul 6, 2017Updated 8 years ago
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆104Jul 26, 2016Updated 9 years ago
- Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)☆140Jan 4, 2017Updated 9 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆440Aug 22, 2018Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Jan 15, 2017Updated 9 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- ☆63Apr 13, 2017Updated 9 years ago
- ☆165May 18, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- plugin of ida with pin☆48Jan 25, 2021Updated 5 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆147Jul 30, 2017Updated 8 years ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆346May 5, 2019Updated 6 years ago
- Teaching old shellcode new tricks☆210Aug 1, 2017Updated 8 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- Black Hat 2016 Slides, Paper and Code☆83Aug 10, 2016Updated 9 years ago
- Content from presentation at BHUSA 2017☆179Jul 27, 2017Updated 8 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆13Jun 13, 2017Updated 8 years ago
- ☆138Jul 13, 2017Updated 8 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 9 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆641Jul 7, 2017Updated 8 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Oct 17, 2017Updated 8 years ago
- ☆522Feb 22, 2020Updated 6 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Detect, analyze and uniquely identify crashes in Windows applications☆523May 23, 2025Updated 11 months ago
- ☆407Mar 1, 2017Updated 9 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆726Nov 19, 2017Updated 8 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 9 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago