clymb3r / KdExploitMe
A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.
☆405Updated 10 years ago
Alternatives and similar repositories for KdExploitMe:
Users that are interested in KdExploitMe are comparing it to the libraries listed below
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆395Updated 5 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆434Updated 6 years ago
- Content from presentation at BHUSA 2017☆180Updated 7 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆263Updated 7 years ago
- C++ application that uses memory and code hooks to detect packers☆270Updated 7 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆133Updated 9 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆286Updated 8 years ago
- Python scripts for reverse engineering.☆184Updated 3 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆163Updated 8 years ago
- Windows XP 32-Bit Bootkit☆145Updated 10 years ago
- TDL4 style rootkit to spoof read/write requests to master boot record☆130Updated 7 years ago
- A tool to detect and crash Cuckoo Sandbox☆293Updated 9 months ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 7 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆159Updated 8 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆97Updated 12 years ago
- ☆141Updated 8 years ago
- Patching ROP-encoded shellcodes into PEs☆184Updated 7 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆149Updated 2 years ago
- HORSEPILL rootkit PoC☆226Updated 8 years ago
- Automatically exported from code.google.com/p/ioctlfuzzer☆162Updated 9 years ago
- ☆234Updated 7 years ago
- Cross Architecture Shellcode in C☆200Updated 8 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆367Updated 8 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Updated 4 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆145Updated 7 years ago
- PEI stage backdoor for UEFI compatible firmware☆221Updated 4 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆182Updated 6 years ago
- ☆115Updated 8 years ago
- Conference slides and White-papers☆357Updated 5 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆151Updated 4 years ago