a1ext / Windows-Exploit-SuggesterLinks
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins. Supports Python 3!
☆15Updated 3 years ago
Alternatives and similar repositories for Windows-Exploit-Suggester
Users that are interested in Windows-Exploit-Suggester are comparing it to the libraries listed below
Sorting:
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 4 years ago
- A repository where I share my injection implemintations☆29Updated 4 years ago
- AMSI detection PoC☆31Updated 5 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 3 years ago
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆76Updated 5 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 5 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 10 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- In 'n Out - See what goes in and comes out of PEs☆34Updated 3 years ago
- Dumping credentials through windbg and pykd☆40Updated last year
- Python 3 server used to control SK8RAT implant☆36Updated 4 years ago
- Simple skeleton for a CPP DLL☆29Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- ☆24Updated 3 years ago
- Sysmon shenanigans☆65Updated 4 years ago
- ☆31Updated 4 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 4 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- Procscan is a quick and dirty python script used to look for potentially dangerous api call patterns in a Procmon PML file.☆11Updated 2 years ago
- Small visualizator for PE files☆69Updated last year
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆15Updated 4 years ago
- A simple injector that uses LoadLibraryA☆18Updated 4 years ago
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Updated 6 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆34Updated 4 years ago