clymb3r / KdExploitMeLinks
A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.
☆405Updated 10 years ago
Alternatives and similar repositories for KdExploitMe
Users that are interested in KdExploitMe are comparing it to the libraries listed below
Sorting:
- Content from presentation at BHUSA 2017☆181Updated 8 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆264Updated 8 years ago
- A tool to detect and crash Cuckoo Sandbox☆295Updated last year
- ATrace is a tool for tracing execution of binaries on Windows.☆239Updated 8 years ago
- Cross Architecture Shellcode in C☆203Updated 8 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆164Updated 8 years ago
- C++ application that uses memory and code hooks to detect packers☆271Updated 7 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆135Updated 9 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 7 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆159Updated 9 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆145Updated 8 years ago
- Automatically exported from code.google.com/p/ioctlfuzzer☆167Updated 10 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆286Updated 9 years ago
- A set of tutorials about code injection for Windows.☆312Updated 11 months ago
- Exploiting MS15-061 local Privilege escalation☆49Updated 9 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆436Updated 6 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- ☆138Updated 3 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Updated 4 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆405Updated 5 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- Linux bind shell with anti-reverse engineering techniques☆288Updated 8 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆99Updated 8 years ago
- Conference slides and White-papers☆357Updated 5 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆141Updated 8 years ago
- HORSEPILL rootkit PoC☆228Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆300Updated 2 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Updated 10 years ago
- C++-based shellcode builder☆114Updated 4 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Updated 12 years ago