cbayet / PoolSprayer
Simple library to spray the Windows Kernel Pool
☆109Updated 5 years ago
Alternatives and similar repositories for PoolSprayer
Users that are interested in PoolSprayer are comparing it to the libraries listed below
Sorting:
- kernel pool windbg extension☆82Updated 9 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆94Updated 3 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 6 years ago
- ☆62Updated 8 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆62Updated 7 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆55Updated 8 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 6 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆123Updated 6 years ago
- Windows RPC Python fuzzer☆161Updated 7 years ago
- ☆49Updated 7 years ago
- A windbg extension, extracting token related contents☆41Updated 4 years ago
- ☆34Updated 7 years ago
- Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques☆54Updated 7 years ago
- Kernel driver to fuzz Hyper-V hypercalls☆137Updated 6 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆116Updated 6 years ago
- windbg plugin for win32k debugging☆75Updated 5 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- ☆91Updated 5 years ago
- POC and exploitation of vulnerabilities☆90Updated 3 years ago
- ☆34Updated 9 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated 10 months ago
- Win32k Exploit by Grant Willcox☆89Updated 5 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Updated 7 years ago
- A simple API monitor for Windbg☆63Updated 8 years ago
- ☆31Updated 7 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆116Updated 8 years ago
- exploit development☆49Updated 7 years ago
- ☆234Updated 7 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆41Updated 5 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆40Updated 10 years ago