clymb3r / KdExploitMeLinks
A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.
☆406Updated 11 years ago
Alternatives and similar repositories for KdExploitMe
Users that are interested in KdExploitMe are comparing it to the libraries listed below
Sorting:
- Content from presentation at BHUSA 2017☆180Updated 8 years ago
- ATrace is a tool for tracing execution of binaries on Windows.☆240Updated 2 weeks ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Updated 10 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆264Updated 8 years ago
- ☆137Updated 4 years ago
- C++ application that uses memory and code hooks to detect packers☆273Updated 7 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆170Updated 8 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆160Updated 9 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆146Updated 8 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 8 years ago
- Automatically exported from code.google.com/p/ioctlfuzzer☆171Updated 10 years ago
- A tool to detect and crash Cuckoo Sandbox☆295Updated last year
- Cross Architecture Shellcode in C☆206Updated 9 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆410Updated 5 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆288Updated 9 years ago
- A set of tutorials about code injection for Windows.☆312Updated last year
- Exploiting MS15-061 local Privilege escalation☆49Updated 10 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Updated 4 years ago
- C++-based shellcode builder☆115Updated 5 years ago
- Python scripts for reverse engineering.☆187Updated 4 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆438Updated 7 years ago
- ☆235Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆299Updated 2 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆86Updated 9 years ago
- Automated Exploit generation with WinDBG☆191Updated 9 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆216Updated 7 years ago
- Conference slides and White-papers☆359Updated 5 years ago
- Windows XP 32-Bit Bootkit☆145Updated 10 years ago
- Cross Platform Kernel Fuzzer Framework☆453Updated 7 years ago
- TDL4 style rootkit to spoof read/write requests to master boot record☆130Updated 7 years ago