can1357 / CVE-2018-8897Links
Arbitrary code execution with kernel privileges using CVE-2018-8897.
☆413Updated 7 years ago
Alternatives and similar repositories for CVE-2018-8897
Users that are interested in CVE-2018-8897 are comparing it to the libraries listed below
Sorting:
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆263Updated 7 years ago
- Patching ROP-encoded shellcodes into PEs☆186Updated 7 years ago
- An attempt at Process Doppelgänging☆181Updated 7 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆145Updated 7 years ago
- ☆398Updated 8 years ago
- windows syscall table from xp ~ 10 rs4☆353Updated 6 years ago
- ☆471Updated 7 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆394Updated 5 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆434Updated 6 years ago
- ☆164Updated 7 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- DLL Injection tool to unlock guest VMs☆235Updated 12 years ago
- Windows Kernel Drivers fuzzer☆348Updated 8 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆298Updated 6 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆368Updated 8 years ago
- An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.☆520Updated 5 years ago
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆324Updated 7 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆224Updated 2 years ago
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆324Updated 8 years ago
- ☆383Updated last year
- A set of tutorials about code injection for Windows.☆311Updated 9 months ago
- Automatically exported from code.google.com/p/ioctlfuzzer☆165Updated 9 years ago
- Search for code cave in all binaries☆282Updated 10 months ago
- Process Doppelgänging☆157Updated 7 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆116Updated 6 years ago
- DriverBuddy is an IDA Python script to assist with the reverse engineering of Windows kernel drivers.☆362Updated 5 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆604Updated 7 years ago
- Exploit for CVE-2019-9810 Firefox on Windows 64-bit.☆229Updated 5 years ago
- Cross Platform Kernel Fuzzer Framework☆450Updated 6 years ago
- Position Independent Windows Shellcode Written in C☆291Updated 6 years ago