MortenSchenk / tagWnd-Hardening-BypassView external linksLinks
Bypass for the hardening against usage of tagWnd as a kernel read/write primitive
☆32Mar 22, 2017Updated 8 years ago
Alternatives and similar repositories for tagWnd-Hardening-Bypass
Users that are interested in tagWnd-Hardening-Bypass are comparing it to the libraries listed below
Sorting:
- Internet Explorer Exploit with CFG bypass for Windows 10☆59Jan 11, 2017Updated 9 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 8 years ago
- ☆18Mar 20, 2017Updated 8 years ago
- Assembly code to use for Windows kernel shellcode to edit winlogon.exe ACL☆13Mar 6, 2017Updated 8 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Jan 23, 2018Updated 8 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Nov 26, 2016Updated 9 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- ☆18Sep 27, 2016Updated 9 years ago
- User-mode kernel callback framework☆10Nov 16, 2013Updated 12 years ago
- by others☆40Jan 28, 2018Updated 8 years ago
- windbg plugin for win32k debugging☆75Oct 14, 2019Updated 6 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- ☆12Aug 2, 2017Updated 8 years ago
- An open source engine consisting of open source and highly portable code libraries written in C/C++.☆11Jan 30, 2018Updated 8 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆79Jan 24, 2011Updated 15 years ago
- ☆36Oct 29, 2020Updated 5 years ago
- ☆54Feb 27, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- Handy WMI query tool.☆12Jun 20, 2016Updated 9 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆148Jul 30, 2017Updated 8 years ago
- ☆39Mar 31, 2021Updated 4 years ago
- Windows Kernel Driver - Create a driver device in TDI layer of windows kernel to capture network data packets☆36Jul 21, 2014Updated 11 years ago
- Modify process handle permissions☆61Nov 30, 2016Updated 9 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- Process Filter for Python☆16Jan 19, 2016Updated 10 years ago
- 中间人代理☆12Aug 21, 2013Updated 12 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- this is a small example for NDIS Firewall☆26Mar 17, 2016Updated 9 years ago
- kernel pool windbg extension☆83Jul 23, 2015Updated 10 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆115Jan 21, 2025Updated last year
- reverse engineering extension plugin for windbg☆120Sep 30, 2019Updated 6 years ago
- ☆17Mar 3, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/bypass-x64-dse☆20Oct 1, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/wskudp☆13Jun 29, 2017Updated 8 years ago