Repository of vulnerabilities disclosed by ESET
☆29Jul 13, 2022Updated 3 years ago
Alternatives and similar repositories for vulnerability-disclosures
Users that are interested in vulnerability-disclosures are comparing it to the libraries listed below
Sorting:
- A standalone python script leveraging ntdll for UEFI variable enumeration. This uses elements from the "chipsec" toolkit for formatting w…☆10Jul 25, 2023Updated 2 years ago
- windows内核安全与驱动开发代码☆12Apr 4, 2020Updated 5 years ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 2 years ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- ☆14Jul 12, 2024Updated last year
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆58Nov 16, 2021Updated 4 years ago
- Hex Calculator for Windows☆13Dec 2, 2016Updated 9 years ago
- ☆38Jan 6, 2025Updated last year
- Process hunting Toolkit is toolkit capable of hunting down malicious processes on Windows☆14Jan 31, 2025Updated last year
- ☆90Oct 17, 2020Updated 5 years ago
- lojax_uefi_rootkit_checker☆19Nov 18, 2018Updated 7 years ago
- Iterate over Windows Handles☆15Nov 18, 2025Updated 3 months ago
- ☆14Jun 21, 2020Updated 5 years ago
- Tool to dump EFI runtime drivers.☆39Feb 23, 2024Updated 2 years ago
- Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares☆76Oct 22, 2016Updated 9 years ago
- Checks for tpm vulnerabilities☆38Mar 16, 2023Updated 2 years ago
- Ghosting-AMSI☆18Apr 30, 2025Updated 10 months ago
- ☆16Jan 10, 2017Updated 9 years ago
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- NT AUTHORITY\SYSTEM☆43Jul 8, 2020Updated 5 years ago
- CVE-2017-5721 Proof-of-Concept☆17Oct 23, 2017Updated 8 years ago
- ☆19Mar 17, 2025Updated 11 months ago
- ☆24Aug 27, 2021Updated 4 years ago
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated last year
- Register a callback from a Manually mapped kernel module☆16Feb 1, 2022Updated 4 years ago
- vdk is a set of utilities used to help with exploitation of a vulnerable driver.☆46May 22, 2022Updated 3 years ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43May 22, 2024Updated last year
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆48Jun 5, 2022Updated 3 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- Check if the trust of a ROM image may be affected by the recent Intel Alder Lake leak☆18May 10, 2023Updated 2 years ago
- D☆44May 3, 2021Updated 4 years ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/narly☆24Jul 11, 2021Updated 4 years ago
- WinDbg workplace settings that I use for debugging☆16Aug 3, 2017Updated 8 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91May 10, 2021Updated 4 years ago
- ☆50Dec 15, 2025Updated 2 months ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆96Dec 20, 2021Updated 4 years ago
- PCILeech HP iLO4 Service☆24Jan 9, 2019Updated 7 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago