Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)
☆236Jun 22, 2023Updated 2 years ago
Alternatives and similar repositories for Exploit-Development
Users that are interested in Exploit-Development are comparing it to the libraries listed below
Sorting:
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆249Jul 9, 2024Updated last year
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆96Dec 20, 2021Updated 4 years ago
- ☆208Apr 5, 2022Updated 3 years ago
- Static Binary Instrumentation tool for Windows x64 executables☆206Sep 29, 2025Updated 5 months ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- ☆318Apr 8, 2022Updated 3 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆136Jan 2, 2023Updated 3 years ago
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆622Sep 26, 2023Updated 2 years ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆185Nov 10, 2023Updated 2 years ago
- Sysmon-Like research tool for ETW☆384Nov 15, 2022Updated 3 years ago
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆411Jul 4, 2025Updated 7 months ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- PoCs for Kernelmode rootkit techniques research.☆431Nov 4, 2025Updated 3 months ago
- Resources for Windows exploit development☆1,649Dec 20, 2021Updated 4 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆250Jul 5, 2022Updated 3 years ago
- Small and convenient C2 tool for Windows targets☆612Mar 8, 2022Updated 3 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆57Feb 2, 2026Updated 3 weeks ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Dec 24, 2022Updated 3 years ago
- Lenovo Diagnostics Driver EoP - Arbitrary R/W☆178Dec 5, 2022Updated 3 years ago
- ☆25Apr 28, 2024Updated last year
- Replace the .txt section of the current loaded modules from \KnownDlls\☆305Sep 28, 2022Updated 3 years ago
- Silence EDRs by removing kernel callbacks☆239Dec 7, 2020Updated 5 years ago
- ☆16Nov 23, 2021Updated 4 years ago
- FastSymApi - A Fast API PDB Symbol Cache Server that efficiently caches and compresses PDBs on disk for quick and repeated retrieval.☆19Feb 12, 2026Updated 2 weeks ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Aug 4, 2021Updated 4 years ago
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆650Mar 14, 2025Updated 11 months ago
- A small x64 library to load dll's into memory.☆457Nov 6, 2023Updated 2 years ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆191Aug 9, 2021Updated 4 years ago
- Template-Driven AV/EDR Evasion Framework☆1,777Nov 3, 2023Updated 2 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆122Jul 21, 2022Updated 3 years ago
- A Pin Tool for tracing API calls etc☆1,620Feb 8, 2026Updated 2 weeks ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆141Feb 27, 2023Updated 3 years ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆590Aug 2, 2025Updated 6 months ago
- HookChain: A new perspective for Bypassing EDR Solutions☆590Jan 5, 2025Updated last year
- A modern 32/64-bit position independent implant template☆1,293Mar 21, 2025Updated 11 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆268Aug 31, 2022Updated 3 years ago
- PoCs and tools for investigation of Windows process execution techniques☆952Feb 2, 2026Updated 3 weeks ago
- ☆118Aug 7, 2022Updated 3 years ago
- Win32 and Kernel abusing techniques for pentesters☆975Sep 3, 2023Updated 2 years ago