ayoubfaouzi / windows-exploitationLinks
My notes while studying Windows exploitation
☆193Updated 2 years ago
Alternatives and similar repositories for windows-exploitation
Users that are interested in windows-exploitation are comparing it to the libraries listed below
Sorting:
- Recon 2023 slides and code☆80Updated 2 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆85Updated 8 years ago
- Windows System Programming Experiments☆223Updated 3 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆192Updated 6 months ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆165Updated 3 years ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆127Updated 2 years ago
- MalUnpack companion driver☆99Updated last year
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆236Updated 2 years ago
- ☆163Updated 4 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆91Updated 2 years ago
- Kernel Exploits☆260Updated 4 years ago
- A comprehensive Hypervisor resources repo☆189Updated 3 months ago
- Advanced driver monitoring utility.☆218Updated 3 years ago
- ☆98Updated 4 years ago
- ☆140Updated 4 years ago
- A dynamic unpacking tool☆145Updated 2 years ago
- Some of my windows kernel exploits for learning purposes☆135Updated 3 years ago
- Windows Kernel Programming☆133Updated 5 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆128Updated 11 months ago
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆154Updated 2 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆74Updated 3 years ago
- ☆65Updated 2 years ago
- Set of antianalysis techniques found in malware☆133Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Updated 3 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆227Updated 5 years ago
- Exploitable drivers, you know what I mean☆153Updated 2 months ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆96Updated 4 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆247Updated 3 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆119Updated 2 years ago