Exploit for HEVD
☆10Sep 11, 2019Updated 6 years ago
Alternatives and similar repositories for Windows-Kernel-Exploit
Users that are interested in Windows-Kernel-Exploit are comparing it to the libraries listed below
Sorting:
- Hook for the PoC for exploiting CVE-2024-32002☆16May 19, 2024Updated last year
- ☆10Mar 5, 2016Updated 10 years ago
- 搜集的一些kernel paper☆26Feb 19, 2020Updated 6 years ago
- A set of tools and exploits to cause DoS for remote Windows Server & Windows 11 machines☆32Feb 9, 2026Updated last month
- ☆24Sep 26, 2021Updated 4 years ago
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆32Jul 9, 2021Updated 4 years ago
- Some good ctf challenge☆11Mar 23, 2019Updated 6 years ago
- Tracking OpenClaw CVEs☆104Updated this week
- 逆的或者收集的别人家的代码☆29Feb 6, 2025Updated last year
- Small driver that uses alternative syscalls feature☆18May 9, 2024Updated last year
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 2 years ago
- Windbg scripts☆19Mar 5, 2015Updated 11 years ago
- CVE 2019-5791 working exploit☆21Sep 9, 2019Updated 6 years ago
- via load data local infile to attack client☆30Oct 29, 2019Updated 6 years ago
- Sample app showing delegated authentication☆11Jun 4, 2019Updated 6 years ago
- ☆20Mar 9, 2021Updated 5 years ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- 2048 written in x64 assembly for educational purposes (OS: Windows)☆17Oct 19, 2021Updated 4 years ago
- ☆13May 15, 2021Updated 4 years ago
- fastjson-1.2.61-RCE☆33Sep 26, 2019Updated 6 years ago
- ☆33Sep 24, 2021Updated 4 years ago
- fofa+xray vul scan golang☆10Sep 19, 2021Updated 4 years ago
- A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows proc…☆26Nov 26, 2025Updated 3 months ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- ☆18May 6, 2023Updated 2 years ago
- exploit-database-papers☆13Nov 27, 2017Updated 8 years ago
- Simple algorithm to brute force CRC32 hashes☆16Dec 29, 2016Updated 9 years ago
- OpenWebRTC specific GStreamer plugins☆51Nov 11, 2018Updated 7 years ago
- BadgerTrap is a tool to instrument x86-64 TLB misses.☆13Nov 13, 2016Updated 9 years ago
- ☆36Sep 7, 2020Updated 5 years ago
- ☆23Jun 18, 2021Updated 4 years ago
- A Secure-ish Crypto Execution Module☆16Jun 22, 2022Updated 3 years ago
- ☆12Aug 1, 2023Updated 2 years ago
- Using Data Memory-Dependent Prefetchers to Leak Data at Rest☆39Sep 6, 2022Updated 3 years ago
- ☆13Jul 28, 2022Updated 3 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆51Dec 16, 2020Updated 5 years ago
- Library for using direct system calls☆35Jan 30, 2025Updated last year
- For Example. See Miro's Blog☆30Nov 26, 2022Updated 3 years ago