aaaddress1 / shellDev.pyLinks
tool for building windows shellcode in C by MinGW
☆54Updated 4 years ago
Alternatives and similar repositories for shellDev.py
Users that are interested in shellDev.py are comparing it to the libraries listed below
Sorting:
- simple compiler based on mingw to build uncrackable windows application against analysis tools☆63Updated 8 years ago
- Windows x86 PE Packer In C++☆52Updated 6 years ago
- Windows Injection 101: from Zero to ROP (HITCON 2017)☆29Updated 8 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22Updated 6 years ago
- GUI Application in C# to run and disassemble shellcode☆36Updated 8 years ago
- PoC for CVE-2020-1015☆39Updated 5 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆15Updated 5 years ago
- Proof of Concept code for CVE-2020-0728☆47Updated 5 years ago
- POC for CVE-2018-0824☆87Updated 3 years ago
- a open source rat from china☆26Updated 9 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 6 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆125Updated 5 years ago
- cve-2019-0808-poc☆48Updated 6 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- ☆92Updated 4 years ago
- CVE-2019-9729. Transferred from https://github.com/DoubleLabyrinth/SdoKeyCrypt-sys-local-privilege-elevation☆83Updated 6 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- ☆26Updated 7 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆50Updated 5 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 8 years ago
- Run some secret code invisible from debugger single step.(x86 process on x64 windows only)☆25Updated 5 years ago
- Synaptics Audio Driver LPE☆37Updated 6 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Updated 6 years ago
- UIAccess UAC Bypass using token duplication and keyboard events☆27Updated 6 years ago
- ☆28Updated 7 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆92Updated 7 years ago
- EoP POC for CVE-2019-1132☆61Updated 6 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Updated 6 years ago
- CVE-2020-1337 Windows Print Spooler Privilege Escalation☆152Updated 2 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆54Updated 5 years ago