Exploit for HEVD
☆10Sep 11, 2019Updated 6 years ago
Alternatives and similar repositories for Windows-Kernel-Exploit
Users that are interested in Windows-Kernel-Exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hook for the PoC for exploiting CVE-2024-32002☆16May 19, 2024Updated 2 years ago
- ☆10Mar 5, 2016Updated 10 years ago
- 搜集的一些kernel paper☆26Feb 19, 2020Updated 6 years ago
- A set of tools and exploits to cause DoS for remote Windows Server & Windows 11 machines☆32Feb 9, 2026Updated 3 months ago
- ☆24Sep 26, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆32Jul 9, 2021Updated 4 years ago
- Some good ctf challenge☆11Mar 23, 2019Updated 7 years ago
- 逆的或者收集的别人家的代码☆29Feb 6, 2025Updated last year
- Small driver that uses alternative syscalls feature☆18May 9, 2024Updated 2 years ago
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 3 years ago
- CVE 2019-5791 working exploit☆20Sep 9, 2019Updated 6 years ago
- Windbg scripts☆20Mar 5, 2015Updated 11 years ago
- via load data local infile to attack client☆30Oct 29, 2019Updated 6 years ago
- Sample app showing delegated authentication☆11Jun 4, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆20Mar 9, 2021Updated 5 years ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- 2048 written in x64 assembly for educational purposes (OS: Windows)☆17Oct 19, 2021Updated 4 years ago
- ☆14May 15, 2021Updated 5 years ago
- fastjson-1.2.61-RCE☆33Sep 26, 2019Updated 6 years ago
- ☆32Sep 24, 2021Updated 4 years ago
- fofa+xray vul scan golang☆10Sep 19, 2021Updated 4 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 8 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆23Oct 6, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆18May 6, 2023Updated 3 years ago
- Simple algorithm to brute force CRC32 hashes☆16Dec 29, 2016Updated 9 years ago
- OpenWebRTC specific GStreamer plugins☆51Nov 11, 2018Updated 7 years ago
- Tracking OpenClaw CVEs☆157Updated this week
- BadgerTrap is a tool to instrument x86-64 TLB misses.☆13Nov 13, 2016Updated 9 years ago
- ☆36Sep 7, 2020Updated 5 years ago
- ☆23Jun 18, 2021Updated 4 years ago
- A guide to get you started with Windows Kernel Debugging walking you through the complete setup and usage of WinDbg to trace Windows proc…☆28Nov 26, 2025Updated 5 months ago
- A Secure-ish Crypto Execution Module☆16Jun 22, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- exploit-database-papers☆14Nov 27, 2017Updated 8 years ago
- ☆12Aug 1, 2023Updated 2 years ago
- ☆15Jul 28, 2022Updated 3 years ago
- Using Data Memory-Dependent Prefetchers to Leak Data at Rest☆39Sep 6, 2022Updated 3 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆51Dec 16, 2020Updated 5 years ago
- Library for using direct system calls☆35Jan 30, 2025Updated last year
- For Example. See Miro's Blog☆30Nov 26, 2022Updated 3 years ago