☆30Sep 5, 2025Updated 5 months ago
Alternatives and similar repositories for Presentations
Users that are interested in Presentations are comparing it to the libraries listed below
Sorting:
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆32Apr 13, 2017Updated 8 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 5 years ago
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 8 years ago
- NT AUTHORITY\SYSTEM☆43Jul 8, 2020Updated 5 years ago
- ☆71Oct 31, 2023Updated 2 years ago
- A specially crafted IOCTL can be issued to the rzpnk.sys driver in Razer Synapse 2.20.15.1104 that is forwarded to ZwOpenProcess allowing…☆14Nov 8, 2020Updated 5 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- ☆13Mar 27, 2021Updated 4 years ago
- Proof of concept for CVE-2018-4150 by @cmwdotme☆14May 8, 2018Updated 7 years ago
- Exploit of RealVNC VNC Server☆27Oct 18, 2022Updated 3 years ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- Quarantine bypass and RCE vulnerability in Sketch (proof-of-concept)☆13Nov 22, 2021Updated 4 years ago
- Blog posts☆29Aug 7, 2020Updated 5 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Jun 26, 2021Updated 4 years ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- XOR crypt/decrypt using C#☆12Sep 30, 2020Updated 5 years ago
- POC for CVE-2021-1699☆17Mar 31, 2021Updated 4 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.☆16Nov 27, 2025Updated 3 months ago
- using gpuz to load driver☆36Mar 14, 2019Updated 6 years ago
- Exploit for CVE-2021-40449☆54Nov 7, 2021Updated 4 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆22Jan 13, 2018Updated 8 years ago
- allowing um r/w through km from um ioctl ™☆11Jan 2, 2022Updated 4 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- ☆15Mar 13, 2023Updated 2 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- a dumb rpm/wpm example driver☆15Jun 7, 2021Updated 4 years ago
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆150Mar 2, 2023Updated 3 years ago
- Kernel Exploits☆260Jul 18, 2021Updated 4 years ago
- r0akmap is a PoC driver manual mapper based on r0ak☆38Aug 18, 2018Updated 7 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Jul 15, 2021Updated 4 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Aug 4, 2022Updated 3 years ago
- ☆14Jan 7, 2022Updated 4 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago