☆121Jun 16, 2020Updated 5 years ago
Alternatives and similar repositories for exploit
Users that are interested in exploit are comparing it to the libraries listed below
Sorting:
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- R3劫持所有异常☆15Jan 4, 2021Updated 5 years ago
- 搜集的一些kernel paper☆26Feb 19, 2020Updated 6 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- Windows Graphics Device Interface (GDI+) fuzzer☆130Aug 13, 2020Updated 5 years ago
- ☆130Aug 23, 2022Updated 3 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- Just another useless C2 occupying space in some HDD somewhere.☆21Jul 4, 2023Updated 2 years ago
- ☆15Sep 14, 2022Updated 3 years ago
- Exploit Development: Case Studies 🔮☆25Jun 10, 2018Updated 7 years ago
- BypaPH - Process Hacker's bypass (read/write any process virtual memory & kernel mem) 带签名驱动,驱动级内存读取☆23Sep 3, 2020Updated 5 years ago
- windwos内核研究与驱动Code☆67Dec 25, 2021Updated 4 years ago
- Interprocess communication library, providing the ability to call functions from each other☆20Oct 3, 2019Updated 6 years ago
- 笔者的在原作者池风水利用工具(以下简称工具)基础上进行二次开发,新增了全自动获取内核调试模块符号的偏移量及配置参数和不同漏洞利用方式优化等功能, 解决了不同Windows版本适配问题,工具包括适配驱动和利用程序两部分组成,实现了在Windows 10 19H1之后任意版本包…☆77Dec 31, 2021Updated 4 years ago
- Call NtCreateUserProcess directly as normal.☆77May 17, 2022Updated 3 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆58Nov 16, 2021Updated 4 years ago
- ☆73Aug 31, 2022Updated 3 years ago
- CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)☆31Oct 12, 2021Updated 4 years ago
- Chrome V8 exploit guide for starter from build to exploit in Korean. If This has incorrect information, Please let me know, Chrome V8 Ex…☆162Apr 13, 2019Updated 6 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- this application shows EAC sdk's memory leak.☆10Nov 30, 2021Updated 4 years ago
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- Static Library For Windows Drivers☆41Dec 13, 2025Updated 2 months ago
- 扫描以及恢复 r3hook 类☆10Aug 29, 2021Updated 4 years ago
- adobe reader sandbox utility☆11Aug 7, 2020Updated 5 years ago
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆22Jan 28, 2021Updated 5 years ago
- Just another Windows Process Injection☆408Aug 7, 2020Updated 5 years ago
- APC Internals Research Code☆169Jun 28, 2020Updated 5 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆215Jul 2, 2020Updated 5 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆108Mar 8, 2023Updated 2 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37May 9, 2015Updated 10 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Jul 7, 2020Updated 5 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- A demonstration of how page tables can be used to run arbitrary code in ring-0 and lead to a privesc. Uses CVE-2016-7255 as an example.☆11Jun 11, 2018Updated 7 years ago
- Ready-to-use headers for Windows Kernel SSDT indices☆11Apr 12, 2020Updated 5 years ago
- ebpf covert channel rootkit☆15Feb 6, 2024Updated 2 years ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆657Jan 28, 2025Updated last year