The place where my HackSys Extreme Vulnerable Driver exploits go.
☆25Oct 21, 2018Updated 7 years ago
Alternatives and similar repositories for HEVD-exploits
Users that are interested in HEVD-exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated last month
- crash poc & Leak info PoC☆17Mar 19, 2018Updated 8 years ago
- POC and exploitation of vulnerabilities☆91Mar 22, 2022Updated 4 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆50Nov 19, 2019Updated 6 years ago
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This is a PoC for CVE-2019-12594, a vulnerability in DOSBox 0.74-2.☆13Jul 1, 2019Updated 6 years ago
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 9 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆15May 26, 2019Updated 6 years ago
- 💉 Personal project that I inject into games for debugging☆20Nov 30, 2016Updated 9 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Kernel Detective☆152Mar 7, 2026Updated last month
- poc for cve-2017-10661☆12Aug 11, 2017Updated 8 years ago
- A Proof-of-Concept win32 DLL that makes use of netbios session token replay to propagate through a Windows Domain☆25Apr 14, 2018Updated 8 years ago
- ☆29Jan 15, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Symbolic Execution for WebAssembly☆10Jun 10, 2018Updated 7 years ago
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- A debugger for windows platform☆20Oct 31, 2018Updated 7 years ago
- CTF writeup for learning☆22Apr 6, 2021Updated 5 years ago
- 《漏洞战争:软件漏洞分析精要》勘误表☆18Nov 1, 2017Updated 8 years ago
- copy of tdifw lib☆10Jun 15, 2017Updated 8 years ago
- 感染MBR 下载并运行文件。☆33Aug 23, 2022Updated 3 years ago
- Windows_OS_Internals_Curriculum_Resource_Kit-ACADEMIC☆28Nov 17, 2018Updated 7 years ago
- wow64 syscall filter☆14Nov 12, 2014Updated 11 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Mar 13, 2017Updated 9 years ago
- Simple error lookup for Win32 and NTSTATUS errors☆20Nov 25, 2018Updated 7 years ago
- DiskCryptor - Open source partition encryption solution☆42Jan 26, 2014Updated 12 years ago
- ☆10Sep 28, 2017Updated 8 years ago
- system pseudo protocals digger for windows -- Windows 系统下的伪协议查看工具☆17Dec 22, 2016Updated 9 years ago
- ☆29Sep 18, 2015Updated 10 years ago
- Demos for Presentation on Windows Runtime Security☆71Nov 16, 2018Updated 7 years ago
- The exploit for Panda AV LPE☆37May 22, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆14Feb 23, 2018Updated 8 years ago
- 从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能☆11Mar 11, 2020Updated 6 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆38Oct 7, 2021Updated 4 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 7 years ago
- ☆22May 25, 2017Updated 8 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Jan 23, 2018Updated 8 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆147Jul 30, 2017Updated 8 years ago