forrest-orr / ExploitsLinks
A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in conjunction with these exploits.
☆121Updated 3 years ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below
Sorting:
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated last year
- Google Chrome Use After Free☆59Updated 3 years ago
- ☆72Updated last year
- Some of my windows kernel exploits for learning purposes☆130Updated 3 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆55Updated 3 years ago
- Random CVEs☆33Updated 4 months ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆147Updated 3 years ago
- Inter-Process Communication Mechanisms☆28Updated 5 years ago
- ☆74Updated last year
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Windows internals and exploitation tricks☆106Updated 3 months ago
- ☆13Updated 4 years ago
- ☆90Updated 4 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆227Updated 2 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 7 months ago
- ☆48Updated 3 years ago
- ☆96Updated 3 years ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆120Updated last year
- ☆48Updated 5 years ago
- ☆163Updated 4 years ago
- ☆18Updated 5 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago
- ☆139Updated 4 years ago
- Slide of my conference presentations☆14Updated last year
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Updated 4 years ago
- ☆83Updated last month
- A Python script to download PDB files associated with a Portable Executable (PE)☆125Updated 7 months ago
- C# Utilities for Windows Notification Facility☆159Updated 5 months ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆159Updated last week