connormcgarr / Kernel-Escalation-of-Privileges-PayloadsView external linksLinks
NT AUTHORITY\SYSTEM
☆43Jul 8, 2020Updated 5 years ago
Alternatives and similar repositories for Kernel-Escalation-of-Privileges-Payloads
Users that are interested in Kernel-Escalation-of-Privileges-Payloads are comparing it to the libraries listed below
Sorting:
- ☆22Jul 10, 2020Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 5 years ago
- Various shellcodes☆13Sep 1, 2020Updated 5 years ago
- hooking KiUserApcDispatcher☆25Apr 3, 2017Updated 8 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- Kernel Exploits☆260Jul 18, 2021Updated 4 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- a dumb rpm/wpm example driver☆15Jun 7, 2021Updated 4 years ago
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- Subtract one PE file from another!☆20Oct 1, 2021Updated 4 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Jun 26, 2021Updated 4 years ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆38Mar 16, 2022Updated 3 years ago
- ☆33Dec 22, 2020Updated 5 years ago
- Corsair LL Access driver abuse☆24Apr 16, 2021Updated 4 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆64Jun 19, 2019Updated 6 years ago
- POC for CVE-2021-1699☆17Mar 31, 2021Updated 4 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆12Jun 7, 2021Updated 4 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- Function hooks in Windows NT Kernel☆27Oct 13, 2020Updated 5 years ago
- ☆30Sep 5, 2025Updated 5 months ago
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated last year
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆144Mar 29, 2021Updated 4 years ago
- ☆15Mar 13, 2023Updated 2 years ago
- Simple code to manipulate the memory of a usermode process from kernel.☆14Apr 24, 2023Updated 2 years ago
- CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)☆31Oct 12, 2021Updated 4 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- ☆16Oct 31, 2022Updated 3 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆126Mar 16, 2021Updated 4 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆36Nov 12, 2021Updated 4 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆50Jan 15, 2021Updated 5 years ago
- x64HOOK库☆18Jan 14, 2020Updated 6 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Aug 26, 2017Updated 8 years ago
- ☆163Sep 18, 2021Updated 4 years ago
- research revolving the windows filtering platform callout mechanism☆39May 26, 2024Updated last year
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- Some usefull info when reverse engineering Kernel Mode Anti-Cheat☆78Feb 20, 2023Updated 2 years ago