Vulnerability examples.
☆411Jan 27, 2026Updated 3 months ago
Alternatives and similar repositories for VulnCases
Users that are interested in VulnCases are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆747Nov 1, 2024Updated last year
- A novel technique to hide code from debuggers & disassemblers☆161Aug 9, 2024Updated last year
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆211Jul 2, 2020Updated 5 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆3,002Feb 24, 2025Updated last year
- Dump of win32k POCs for bugs I've found☆378Mar 6, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC☆379May 24, 2022Updated 3 years ago
- List of Awesome Advanced Windows Exploitation References☆1,562Jan 13, 2022Updated 4 years ago
- Windows syscall fuzzer that I used in 2017 & 2018. Not much to say about it but maybe helpful to someone. At least syscall information it…☆20Nov 20, 2019Updated 6 years ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆722Oct 19, 2024Updated last year
- A collection of links related to VMware escape exploits☆1,491Sep 4, 2024Updated last year
- Toolkit for Hyper-V security research☆156Mar 7, 2022Updated 4 years ago
- A PoC tool for exploiting leaked process and thread handles☆34Feb 13, 2024Updated 2 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Obfuscate specific windows apis with different apis☆1,020Feb 21, 2021Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,355Mar 2, 2026Updated 2 months ago
- A Coverage Explorer for Reverse Engineers☆2,543Feb 14, 2026Updated 3 months ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆421Mar 20, 2022Updated 4 years ago
- Also known by Microsoft as Knifecoat☆1,146Dec 22, 2022Updated 3 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆192Mar 26, 2020Updated 6 years ago
- Enumerate and disable common sources of telemetry used by AV/EDR.☆850Mar 11, 2021Updated 5 years ago
- ☆851Dec 13, 2022Updated 3 years ago
- TrueType and OpenType font fuzzing toolset☆437Aug 28, 2019Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Detect, analyze and uniquely identify crashes in Windows applications☆523May 23, 2025Updated 11 months ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 6 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆639Jul 7, 2017Updated 8 years ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆190Aug 9, 2021Updated 4 years ago
- My repository to upload drivers from different books and all the information related to windows internals.☆164Aug 16, 2019Updated 6 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆748Dec 11, 2023Updated 2 years ago
- CFB is a ProcMon-style tool designed to assist capturing IRPs sent to Windows drivers.☆334Mar 26, 2024Updated 2 years ago
- ☆828Dec 28, 2019Updated 6 years ago
- Collection of Offensive C# Tooling☆1,471Feb 6, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆2,145Sep 14, 2025Updated 8 months ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆124Jul 30, 2020Updated 5 years ago
- collect for learning cases☆595Apr 12, 2026Updated last month
- Set of tools to analyze Windows sandboxes for exposed attack surface.☆2,287Nov 6, 2025Updated 6 months ago
- Resources for Windows exploit development☆1,654Dec 20, 2021Updated 4 years ago
- Token Privilege Research☆881Sep 1, 2017Updated 8 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,527Nov 15, 2023Updated 2 years ago