Bypass for the hardening against usage of tagWnd as a kernel read/write primitive
☆32Mar 22, 2017Updated 9 years ago
Alternatives and similar repositories for tagWnd-Hardening-Bypass
Users that are interested in tagWnd-Hardening-Bypass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Internet Explorer Exploit with CFG bypass for Windows 10☆60Jan 11, 2017Updated 9 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 9 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Jan 23, 2018Updated 8 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 9 years ago
- ☆18Mar 20, 2017Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Assembly code to use for Windows kernel shellcode to edit winlogon.exe ACL☆13Mar 6, 2017Updated 9 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆99Nov 26, 2016Updated 9 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆79Jan 24, 2011Updated 15 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆147Jul 30, 2017Updated 8 years ago
- Driver utilities for building static analysis and other command-line tools.☆23Nov 28, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- windbg plugin for win32k debugging☆75Oct 14, 2019Updated 6 years ago
- Lists work items being queued currently.☆15Jun 7, 2015Updated 10 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- POC and exploitation of vulnerabilities☆91Mar 22, 2022Updated 4 years ago
- kernel pool windbg extension☆83Jul 23, 2015Updated 10 years ago
- ☆41Jul 9, 2020Updated 5 years ago
- ☆18Sep 27, 2016Updated 9 years ago
- User-mode kernel callback framework☆10Nov 16, 2013Updated 12 years ago
- ☆39Mar 31, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆36Oct 29, 2020Updated 5 years ago
- ☆17Mar 3, 2016Updated 10 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- Code coverage calculation/monitoring tool for Corpus Distillation☆16Aug 25, 2016Updated 9 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆57Jun 21, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/ioctlbf☆17Mar 28, 2015Updated 11 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆172Dec 7, 2016Updated 9 years ago
- ☆53Feb 27, 2017Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- TLB splitting VMM☆170May 17, 2016Updated 9 years ago
- by others☆40Jan 28, 2018Updated 8 years ago
- Simple library to spray the Windows Kernel Pool☆110Jan 6, 2020Updated 6 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- Handy WMI query tool.☆12Jun 20, 2016Updated 9 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆635Jul 7, 2017Updated 8 years ago