Sh3lldon / Vulnerable-WinKern-DriversView external linksLinks
Here you can find some vulnerable Windows Kernel Drivers
☆13Feb 21, 2025Updated 11 months ago
Alternatives and similar repositories for Vulnerable-WinKern-Drivers
Users that are interested in Vulnerable-WinKern-Drivers are comparing it to the libraries listed below
Sorting:
- xilinx_cfg☆20Jul 8, 2024Updated last year
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 3 months ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- ☆13Feb 25, 2023Updated 2 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- red team tips and trix☆12Jun 27, 2025Updated 7 months ago
- really ?☆12Feb 29, 2024Updated last year
- ☆16Oct 31, 2021Updated 4 years ago
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Dec 20, 2022Updated 3 years ago
- Not mine, just saved☆14Nov 12, 2023Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- Anti-Debugging, Anti-Reverse Engineering, and Anti-Dumping Techniques. This project is designed to demonstrate and implement a variety of…☆14Jul 30, 2025Updated 6 months ago
- ☆15Jul 10, 2025Updated 7 months ago
- Setup for windows kernel development (development, debugging automation and compiling)☆17Jan 30, 2021Updated 5 years ago
- ☆11Oct 24, 2022Updated 3 years ago
- ☆17Apr 21, 2022Updated 3 years ago
- Easily read and write process memory on windows 🧠☆11Nov 1, 2022Updated 3 years ago
- ☆18Aug 1, 2022Updated 3 years ago
- Red-Teaming TempleOS.☆18Jul 29, 2022Updated 3 years ago
- 信息安全概览☆15Sep 14, 2023Updated 2 years ago
- Use ci.dll API for validating Authenticode signature of files☆166Mar 28, 2022Updated 3 years ago
- Kernel ReClassEx☆66Nov 21, 2023Updated 2 years ago
- apex cheat template☆13Nov 29, 2024Updated last year
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- ☆17Aug 23, 2023Updated 2 years ago
- ☆33Aug 26, 2025Updated 5 months ago
- Reverse Socks5 proxy for windows☆16Oct 13, 2022Updated 3 years ago
- ☆14Feb 2, 2024Updated 2 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆81Nov 13, 2023Updated 2 years ago
- powershell免杀混淆器,简单有效。A simple and effective powershell obfuscaiton tool bypass Anti-Virus☆19Dec 2, 2022Updated 3 years ago
- Active directory Attacks and Scripts☆27Sep 8, 2023Updated 2 years ago
- ☆20May 17, 2022Updated 3 years ago
- read / write memory from a proxy process by injecting shellcode☆20Dec 23, 2025Updated last month
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Oct 20, 2023Updated 2 years ago
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆23Sep 5, 2021Updated 4 years ago
- Hiding SSH public keys in SSH server using a kernel agent☆23Dec 24, 2020Updated 5 years ago
- Python3 HTTP Server with upload functionality☆20Dec 4, 2023Updated 2 years ago