aaaddress1 / winInject101
Windows Injection 101: from Zero to ROP (HITCON 2017)
☆25Updated 7 years ago
Related projects: ⓘ
- IOCTL-Flooder is a verbose tool designed to help with Windows driver fuzzing by brute forcing IOCTLs on loaded drivers. GetLastError is u…☆10Updated 6 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆25Updated 7 years ago
- Kernel mode windows NT API logger☆21Updated 5 years ago
- ☆40Updated this week
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 6 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- ☆22Updated 4 years ago
- ☆19Updated this week
- Resources from my journey into Windows binary exploitation☆22Updated 5 years ago
- ☆31Updated 4 years ago
- ☆16Updated 4 years ago
- Remote PE reflective injection with a simple reflective loader☆28Updated 5 years ago
- ☆21Updated this week
- exploit termdd.sys(support kb4499175)☆58Updated 5 years ago
- ☆44Updated 4 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 4 years ago
- ☆30Updated this week
- Example for PagedOut!☆24Updated 4 years ago
- ☆36Updated this week
- ☆33Updated this week
- ☆44Updated this week
- Call 32bit NtDLL API directly from WoW64 Layer☆59Updated 3 years ago
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Updated 5 years ago
- ☆10Updated 2 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆34Updated 6 years ago
- Execute an arbitrary command within the context of another process☆19Updated 5 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆41Updated 4 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentation…☆19Updated 7 years ago