ThunderJie / Windows-Kernel-ExploitLinks
Exploit for HEVD
☆10Updated 5 years ago
Alternatives and similar repositories for Windows-Kernel-Exploit
Users that are interested in Windows-Kernel-Exploit are comparing it to the libraries listed below
Sorting:
- Command like tool to print mitigation flags for running processes in a memory dump☆46Updated 4 years ago
- Inject unsigned DLL into Protected Process Light (PPL)☆24Updated last month
- Open-source EDR kernel-component for system monitoring and DLL injection☆31Updated 4 years ago
- defender_database☆18Updated last year
- An example of how x64 kernel shellcode can dynamically find and use APIs☆106Updated 5 years ago
- A kernel mode Windows rootkit in development.☆48Updated 3 years ago
- ☆25Updated 6 years ago
- 参考taviso的代码逆向一下mpengine.dll☆19Updated 2 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆51Updated 4 years ago
- Dumps information about all the callback objects found in a dump file and the functions registered for them☆36Updated 4 years ago
- ☆40Updated 3 years ago
- ☆70Updated 4 months ago
- 从admin冲到TrustedInstaller☆17Updated 2 years ago
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆51Updated 4 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆98Updated 4 years ago
- inject dll from kernal mode to user mode process use Apc☆32Updated 5 years ago
- 绕过卡巴斯基主动防御,加载驱动,unhook所有ssdt hook及shadow ssdt hook☆37Updated 9 years ago
- An command-line RPC method enumerator, born out of RPCView's awesomeness☆104Updated 5 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆20Updated 5 years ago
- EoP POC for CVE-2019-1132☆61Updated 5 years ago
- CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)☆30Updated 3 years ago
- ☆11Updated 4 years ago
- ☆20Updated 4 years ago
- win32k use-after-free poc☆72Updated 5 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Updated 9 years ago
- ☆33Updated 3 years ago
- GUI Application in C# to run and disassemble shellcode☆35Updated 7 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆34Updated 6 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆29Updated 3 years ago
- Process reimaging proof of concept code☆96Updated 5 years ago