can1357 / CVE-2018-8897Links
Arbitrary code execution with kernel privileges using CVE-2018-8897.
☆419Updated 7 years ago
Alternatives and similar repositories for CVE-2018-8897
Users that are interested in CVE-2018-8897 are comparing it to the libraries listed below
Sorting:
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆264Updated 8 years ago
- An attempt at Process Doppelgänging☆181Updated 7 years ago
- Patching ROP-encoded shellcodes into PEs☆189Updated 7 years ago
- windows syscall table from xp ~ 10 rs4☆354Updated 7 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆146Updated 8 years ago
- ☆474Updated 7 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆407Updated 5 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆380Updated 8 years ago
- Content from presentation at BHUSA 2017☆180Updated 8 years ago
- ☆164Updated 7 years ago
- ☆384Updated last year
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Updated 4 years ago
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆326Updated 8 years ago
- Windows Kernel Drivers fuzzer☆369Updated 8 years ago
- awesome-windows-security-development☆173Updated 7 years ago
- Position Independent Windows Shellcode Written in C☆299Updated 7 years ago
- ☆403Updated 8 years ago
- POC and exploitation of vulnerabilities☆91Updated 3 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆438Updated 7 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- DLL Injection tool to unlock guest VMs☆239Updated 12 years ago
- Chrome v8 1Day Exploit by István Kurucsai☆167Updated 6 years ago
- A set of tutorials about code injection for Windows.☆312Updated last year
- Exploit for CVE-2019-9810 Firefox on Windows 64-bit.☆227Updated 5 years ago
- my public code☆167Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆119Updated 11 months ago
- Automatically exported from code.google.com/p/ioctlfuzzer☆170Updated 10 years ago
- ☆236Updated 8 years ago
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆337Updated 8 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆304Updated 6 years ago