a1ext / Windows-Exploit-Suggester
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins. Supports Python 3!
☆15Updated 3 years ago
Alternatives and similar repositories for Windows-Exploit-Suggester:
Users that are interested in Windows-Exploit-Suggester are comparing it to the libraries listed below
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 4 years ago
- A repository where I share my injection implemintations☆29Updated 4 years ago
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- AMSI detection PoC☆31Updated 5 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆36Updated last year
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Updated 6 years ago
- Dumping credentials through windbg and pykd☆40Updated last year
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- In 'n Out - See what goes in and comes out of PEs☆34Updated 2 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆70Updated 3 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 4 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 4 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆32Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 3 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆39Updated 3 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- Python 3 server used to control SK8RAT implant☆36Updated 4 years ago
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Updated 2 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆53Updated 3 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆25Updated 4 years ago
- powershell tool for VM evasion☆42Updated 4 years ago