Sh3lldon / WinPWN
This repo for Windows x32-x64 Kernel/Driver/User Mode Exploitation writeups and exploits
☆23Updated 10 months ago
Alternatives and similar repositories for WinPWN:
Users that are interested in WinPWN are comparing it to the libraries listed below
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- ☆21Updated 10 months ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆26Updated 7 months ago
- A few examples of how to trap virtual memory access on Windows.☆27Updated 2 months ago
- ☆29Updated last year
- Native Powers Talk demos☆14Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆51Updated 7 months ago
- API Hammering with C++20☆45Updated 2 years ago
- Reimplementation of the KExecDD DSE bypass technique.☆46Updated 6 months ago
- Enumerate Callbacks and all Object Types☆13Updated 2 years ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆50Updated last year
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆47Updated 2 weeks ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆24Updated 7 months ago
- using the gpu to hide your payload☆54Updated 2 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆17Updated 9 months ago
- In-memory hiding technique☆45Updated 2 months ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- Proof of Concept example for abusing Process Hacker 2 (v2.39.124)☆21Updated 4 months ago