forrest-orr / Exploits
A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in conjunction with these exploits.
☆120Updated 2 years ago
Alternatives and similar repositories for Exploits:
Users that are interested in Exploits are comparing it to the libraries listed below
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆146Updated 2 years ago
- ☆72Updated last year
- ☆113Updated 2 years ago
- Some of my windows kernel exploits for learning purposes☆123Updated 2 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆123Updated 4 years ago
- ☆48Updated 4 years ago
- Windows internals and exploitation tricks☆94Updated 4 months ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Updated 3 years ago
- ☆50Updated 6 years ago
- Random CVEs☆30Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆116Updated this week
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆70Updated 3 years ago
- ☆97Updated 3 years ago
- Inter-Process Communication Mechanisms☆26Updated 4 years ago
- ☆159Updated 3 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆221Updated last year
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆61Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 2 months ago
- Kernel Exploits☆251Updated 3 years ago
- Static Binary Instrumentation tool for Windows x64 executables☆201Updated 2 weeks ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆226Updated 2 years ago
- ☆73Updated 9 months ago
- Winbindex bot to pull in binaries for specific releases☆47Updated last year
- ☆105Updated 9 months ago
- ☆26Updated 2 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆64Updated last year
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 4 years ago
- It's pointy and it hurts!☆125Updated 2 years ago
- ☆24Updated last year