Some CVE resources
☆27Nov 23, 2019Updated 6 years ago
Alternatives and similar repositories for CVE
Users that are interested in CVE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques☆54Oct 6, 2017Updated 8 years ago
- POC for CVE-2021-1699☆17Mar 31, 2021Updated 4 years ago
- WinAFL modified for RDP client fuzzing☆20Dec 18, 2022Updated 3 years ago
- CVE 2019-5791 working exploit☆21Sep 9, 2019Updated 6 years ago
- windbg plugin for win32k debugging☆75Oct 14, 2019Updated 6 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- windows inlinehook R3 R0☆11Apr 11, 2018Updated 7 years ago
- A set of tools and exploits to cause DoS for remote Windows Server & Windows 11 machines☆32Feb 9, 2026Updated last month
- adobe afdko fuzz☆41Aug 12, 2019Updated 6 years ago
- ☆36Jun 14, 2021Updated 4 years ago
- Integer overflow in FreeType software, which also affects Chrome☆29Aug 27, 2025Updated 6 months ago
- Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf☆60Apr 25, 2019Updated 6 years ago
- 搜集的一些kernel paper☆26Feb 19, 2020Updated 6 years ago
- 笔者的在原作者池风水利用工具(以下简称工具)基础上进行二次开发,新增了全自动获取内核调试模块符号的偏移量及配置参数和不同漏洞利用方式优化等功能, 解决了不同Windows版本适配问题,工具包括适配驱动和利用程序两部分组成,实现了在Windows 10 19H1之后任意版本包…☆77Dec 31, 2021Updated 4 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- A repository for my conference presentations☆35Feb 18, 2020Updated 6 years ago
- ☆202Mar 9, 2023Updated 3 years ago
- 逆向小红伞杀毒软件驱动——avdevprot☆24Dec 3, 2017Updated 8 years ago
- POC and exploitation of vulnerabilities☆91Mar 22, 2022Updated 4 years ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆13Oct 3, 2020Updated 5 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆147Jul 30, 2017Updated 8 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆126Mar 16, 2021Updated 5 years ago
- ☆80Apr 27, 2018Updated 7 years ago
- IDA MIPS静态扫描脚本,汇编审计辅助脚本☆17Dec 18, 2020Updated 5 years ago
- ☆14Oct 5, 2019Updated 6 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- java后台开发☆11Jun 28, 2018Updated 7 years ago
- ☆86Oct 29, 2023Updated 2 years ago
- ☆11Sep 5, 2019Updated 6 years ago
- Expand like something similar to less and more action of description of app in Google Play .☆22Feb 13, 2013Updated 13 years ago
- PsSetCreateProcessNotifyRoutine/Ex/Ex2 hook☆13May 30, 2024Updated last year
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- IOCTL-Flooder is a verbose tool designed to help with Windows driver fuzzing by brute forcing IOCTLs on loaded drivers. GetLastError is u…☆11Aug 21, 2018Updated 7 years ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 3 months ago
- Exploit for HEVD☆10Sep 11, 2019Updated 6 years ago
- ☆51Jul 20, 2020Updated 5 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆260Sep 1, 2022Updated 3 years ago
- Sample WinDbg extension☆15Jun 21, 2019Updated 6 years ago