a1ext / Windows-Exploit-Suggester
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins. Supports Python 3!
☆15Updated 3 years ago
Related projects: ⓘ
- NT AUTHORITY\SYSTEM☆37Updated 4 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- A repository where I share my injection implemintations☆28Updated 4 years ago
- ☆29Updated this week
- ☆40Updated this week
- (Sim)ulate (Ba)zar Loader☆29Updated 3 years ago
- ☆21Updated this week
- Recreating and reviewing the Windows persistence methods☆39Updated 2 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆74Updated 4 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆19Updated 3 years ago
- AMSI detection PoC☆30Updated 4 years ago
- Here are some of my malware reversing papers that I will be publishing☆30Updated 2 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated last week
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆41Updated 3 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆21Updated 2 years ago
- ☆23Updated 2 years ago
- Dumping credentials through windbg and pykd☆38Updated 11 months ago
- The repository accompanying the Buer Emulation workshop☆23Updated 3 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- A tool to create COM class/interface relationships in neo4j☆47Updated last year
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆45Updated 4 years ago
- Procscan is a quick and dirty python script used to look for potentially dangerous api call patterns in a Procmon PML file.☆11Updated 2 years ago
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Updated 5 years ago
- ☆27Updated this week
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆49Updated 3 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆15Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆43Updated 2 years ago