A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.
☆408Nov 17, 2014Updated 11 years ago
Alternatives and similar repositories for KdExploitMe
Users that are interested in KdExploitMe are comparing it to the libraries listed below
Sorting:
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- Cross Platform Kernel Fuzzer Framework☆457Oct 11, 2018Updated 7 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆437Aug 22, 2018Updated 7 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,965Feb 24, 2025Updated last year
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- windows syscall table from xp ~ 10 rs4☆356Jun 8, 2018Updated 7 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- Windows Software Exploitation☆136Feb 14, 2017Updated 9 years ago
- Better version of RunDll with GUI. This program allows you to load DLLs on Windows. You can select how to load the DLL. By direct Entry P…☆240Apr 8, 2015Updated 10 years ago
- ☆408Mar 1, 2017Updated 9 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆96Nov 4, 2021Updated 4 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆415Jan 2, 2020Updated 6 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆382Apr 17, 2017Updated 8 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆635Jul 7, 2017Updated 8 years ago
- API logger plugin for Intel Pintool☆14Nov 19, 2017Updated 8 years ago
- DriverBuddy is an IDA Python script to assist with the reverse engineering of Windows kernel drivers.☆372Jan 8, 2020Updated 6 years ago
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆127Dec 3, 2022Updated 3 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆304Jan 12, 2023Updated 3 years ago
- Token Privilege Research☆873Sep 1, 2017Updated 8 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- Elevation of privilege detector based on HyperPlatform☆123Mar 5, 2017Updated 9 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Mar 20, 2021Updated 5 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- Exploit primitives for PowerShell☆437Mar 25, 2018Updated 7 years ago
- Some kernel fuzzing paper about windows and linux☆255Oct 9, 2017Updated 8 years ago
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Jul 1, 2017Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Content from presentation at BHUSA 2017☆180Jul 27, 2017Updated 8 years ago