VoidSec / VulnerableWindowsDriversLinks
A collection of Vulnerable Windows Drivers
☆14Updated 3 years ago
Alternatives and similar repositories for VulnerableWindowsDrivers
Users that are interested in VulnerableWindowsDrivers are comparing it to the libraries listed below
Sorting:
- Windows File Enumeration Intel Gathering Tool.☆17Updated 2 years ago
- Dell Driver EoP (CVE-2021-21551)☆32Updated 3 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated 2 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Updated 2 years ago
- Unpacking tool for the zipExec Crypter☆14Updated 4 years ago
- ☆28Updated 2 years ago
- ☆19Updated 3 years ago
- Small POC for process ghosting☆40Updated 3 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 4 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆67Updated 3 years ago
- Run PowerShell command without invoking powershell.exe☆35Updated 3 years ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Updated 3 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated 2 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 3 years ago
- x64 Windows package of the shellcode2exe tool☆14Updated 4 years ago
- ☆27Updated 2 years ago
- A proof‑of‑concept C2 framework that uses Server‑Sent Events (SSE) and the MCP protocol for agent registration, command dispatch, and res…☆29Updated 6 months ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- Adobe Reader DC Information Leak Exploit☆22Updated 3 years ago
- ☆23Updated 3 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆26Updated 6 years ago
- Persistence via Shell Extensions☆62Updated 2 years ago
- ☆18Updated last year
- Elasticsearch Stack Overflow Vulnerability☆18Updated 2 years ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆79Updated 3 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 4 years ago
- Playing with PE's and Building Structures by Hand☆22Updated 3 years ago
- A PoC for achieving persistence via push notifications on Windows☆47Updated 2 years ago