ayoubfaouzi / windows-exploitationLinks
My notes while studying Windows exploitation
☆190Updated 2 years ago
Alternatives and similar repositories for windows-exploitation
Users that are interested in windows-exploitation are comparing it to the libraries listed below
Sorting:
- A curated list of awesome Windows Exploitation resources, and shiny things.☆80Updated 8 years ago
- Recon 2023 slides and code☆79Updated 2 years ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆125Updated 2 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆159Updated 2 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆227Updated 2 years ago
- Windows System Programming Experiments☆221Updated 3 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆188Updated last month
- MalUnpack companion driver☆98Updated last year
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- Advanced driver monitoring utility.☆216Updated 3 years ago
- Kernel Exploits☆259Updated 4 years ago
- Some of my windows kernel exploits for learning purposes☆130Updated 3 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆119Updated last year
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆148Updated 2 years ago
- ☆163Updated 3 years ago
- A comprehensive Hypervisor resources repo☆118Updated 2 weeks ago
- A dynamic unpacking tool☆140Updated last year
- Set of antianalysis techniques found in malware☆130Updated 2 years ago
- Windows Kernel Programming☆130Updated 5 years ago
- ☆139Updated 3 years ago
- ☆96Updated 3 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆55Updated 3 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆93Updated 3 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆125Updated 7 months ago
- Exploitable drivers, you know what I mean☆154Updated last year
- Various Process Injection Techniques☆156Updated 3 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆226Updated 5 years ago
- a PE Loader and Windows API tracer. Useful in malware analysis.☆143Updated 2 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆242Updated 4 years ago