a1ext / Windows-Exploit-Suggester
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins. Supports Python 3!
☆15Updated 3 years ago
Alternatives and similar repositories for Windows-Exploit-Suggester:
Users that are interested in Windows-Exploit-Suggester are comparing it to the libraries listed below
- NT AUTHORITY\SYSTEM☆37Updated 4 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 3 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆17Updated 4 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆20Updated 4 years ago
- A repository where I share my injection implemintations☆29Updated 4 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- ☆31Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆37Updated 3 years ago
- Dumping credentials through windbg and pykd☆38Updated last year
- A tool to create COM class/interface relationships in neo4j☆47Updated 2 years ago
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Updated 5 years ago
- AMSI detection PoC☆30Updated 4 years ago
- Antivirus Emulator Fingerprints☆27Updated 6 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated 4 months ago
- PE File Blessing - To continue or not to continue☆86Updated 5 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 2 years ago
- C# Implementation of Jared Atkinson's Get-InjectedThread.ps1☆50Updated 3 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆33Updated 4 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆15Updated 4 years ago
- Crystal Anti-Exploit Protection 2012☆35Updated 4 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- ☆10Updated 3 years ago
- Proof of concept memory anti-forensic toolkit designed for hiding various artifacts inside the memory dump during memory acquisition on M…☆10Updated 5 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Updated 3 years ago
- Python 3 server used to control SK8RAT implant☆35Updated 4 years ago
- A collection of shellcode hashes☆17Updated 6 years ago