NtRaiseHardError / Windows-Binary-Exploitation
Resources from my journey into Windows binary exploitation
☆22Updated 6 years ago
Alternatives and similar repositories for Windows-Binary-Exploitation:
Users that are interested in Windows-Binary-Exploitation are comparing it to the libraries listed below
- ☆31Updated 4 years ago
- Example for PagedOut!☆24Updated 5 years ago
- ☆23Updated 4 years ago
- Self-Loading Registration Free COM Functions☆11Updated 5 years ago
- Execute an arbitrary command within the context of another process☆20Updated 5 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆23Updated 4 years ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- POC for CVE-2021-1699☆16Updated 3 years ago
- Remote PE reflective injection with a simple reflective loader☆30Updated 5 years ago
- ☆24Updated 3 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16Updated 2 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 6 years ago
- POC For CVE-2022-24483☆15Updated 2 years ago
- ☆11Updated 2 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Updated 5 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago