MortenSchenk / ACL_Edit
Assembly code to use for Windows kernel shellcode to edit winlogon.exe ACL
☆13Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for ACL_Edit
- Malwarebytes Antivirus CVE☆8Updated 6 years ago
- Kernel-mode file scanner☆17Updated 6 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 7 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆21Updated 7 years ago
- Legal access: The driver and console app to demonstrate the basic memory access in kernel mode☆9Updated 6 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Updated 8 years ago
- ☆18Updated 7 years ago
- CVE-2014-0816☆24Updated 8 years ago
- ☆10Updated 7 years ago
- reversed emet tool☆24Updated 12 years ago
- ☆10Updated 10 years ago
- ☆22Updated 7 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆26Updated 7 years ago
- reverse win7 32bit hotpatch implement☆9Updated 11 years ago
- DbgFlashVul☆12Updated 9 years ago
- hooking KiUserApcDispatcher☆22Updated 7 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 6 years ago
- ☆14Updated 7 years ago
- Windows device tree walker☆15Updated 6 years ago
- Debug Bootkit Tool Source☆9Updated 7 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆25Updated 11 years ago
- Dark Cloud Virus☆7Updated 7 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Updated 6 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Updated 6 years ago
- A toolset to assess the behavioral capabilities of AV/HIPS software☆8Updated 11 years ago