MRGEffitas / hwfwbypassView external linksLinks
☆89Oct 14, 2018Updated 7 years ago
Alternatives and similar repositories for hwfwbypass
Users that are interested in hwfwbypass are comparing it to the libraries listed below
Sorting:
- ☆21Aug 7, 2014Updated 11 years ago
- Материалы к статье "Препарируем Hyper V"☆14Nov 5, 2014Updated 11 years ago
- ☆12Oct 12, 2021Updated 4 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆32Nov 17, 2019Updated 6 years ago
- Execute codes From XSLT☆16Dec 28, 2016Updated 9 years ago
- ☆53Oct 27, 2018Updated 7 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Dec 8, 2015Updated 10 years ago
- 支持10万人同时在线Go语言打造高并发web即时聊天(IM)应用☆12Feb 10, 2022Updated 4 years ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- mash hypervisor host pml4☆17Jun 22, 2022Updated 3 years ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 5 years ago
- UDP to TCP tunnel for sending datagrams through weak network☆12Jan 31, 2013Updated 13 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆111Aug 23, 2021Updated 4 years ago
- ☆15Sep 24, 2012Updated 13 years ago
- R3劫持所有异常☆15Jan 4, 2021Updated 5 years ago
- Decompile .Net code in Powershell☆13Sep 21, 2015Updated 10 years ago
- ☆11Jul 16, 2017Updated 8 years ago
- KillDefender的实现☆12Feb 28, 2022Updated 3 years ago
- collection of code snippets,windbg,python scripts and resources☆14Jul 11, 2022Updated 3 years ago
- A collection of useful aggressor scripts. All credits due to its authors.☆12Jul 5, 2019Updated 6 years ago
- ☆10Jul 18, 2022Updated 3 years ago
- GUI版 EXP☆14Mar 20, 2019Updated 6 years ago
- Disable threat tracing from the kernel..☆13Apr 8, 2022Updated 3 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 8 years ago
- Fuzzer☆43Oct 18, 2014Updated 11 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- Random Code Store☆17Mar 27, 2023Updated 2 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 8 years ago
- ☆13Apr 22, 2015Updated 10 years ago
- ☆12Jun 30, 2019Updated 6 years ago
- ROOT AKA BEZNOGIY :(☆19Oct 21, 2021Updated 4 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- 利用chrome扩展 dump 浏览器cookie https://saucer-man.com/information_security/787.html☆15Sep 9, 2021Updated 4 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- Abusing RtlAdjustPrivilege and NtSetInformationProcess to cause a BSOD from usermode☆20Sep 1, 2022Updated 3 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- Logs incoming attempts to connect to NetBIOS/SMB☆14May 15, 2017Updated 8 years ago
- Firefox, Chrome, Safari browser extensions, Rails control server, meterpreter scripts, SET plugin☆55Jul 21, 2022Updated 3 years ago
- Dell Driver EoP (CVE-2021-21551)☆32Feb 24, 2022Updated 3 years ago