d0c-s4vage / narlyLinks
Automatically exported from code.google.com/p/narly
☆24Updated 4 years ago
Alternatives and similar repositories for narly
Users that are interested in narly are comparing it to the libraries listed below
Sorting:
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆23Updated 5 years ago
- Win32k Elevation of Privilege Poc☆1Updated 6 years ago
- ☆50Updated 8 years ago
- Control Flow Guard Teleportation demo☆23Updated 5 years ago
- ☆48Updated 5 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- Crystal Anti-Exploit Protection 2012☆37Updated 5 years ago
- ☆52Updated 8 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- Flare-On solutions☆36Updated 5 years ago
- ☆46Updated 5 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- Ruby ALPC Fuzzer ( joke )☆24Updated 10 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 6 years ago
- ☆36Updated 5 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- ☆21Updated 4 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- Analysis of VBS exploit CVE-2018-8174☆31Updated 7 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆38Updated 9 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆49Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Export disassemblies into Protocol Buffers☆21Updated last week