forrest-orr / ExploitsLinks
A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in conjunction with these exploits.
☆123Updated 3 years ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below
Sorting:
- ☆73Updated 2 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated 2 years ago
- Google Chrome Use After Free☆61Updated 3 years ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆148Updated 3 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- Random CVEs☆34Updated 8 months ago
- Some of my windows kernel exploits for learning purposes☆135Updated 3 years ago
- ☆74Updated last year
- ☆13Updated 4 years ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- ☆48Updated 5 years ago
- Windows internals and exploitation tricks☆112Updated 2 months ago
- ☆91Updated 5 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆236Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆74Updated 3 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 11 months ago
- Inter-Process Communication Mechanisms☆28Updated 5 years ago
- ☆98Updated 4 years ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- ☆56Updated 7 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30Updated 5 years ago
- ☆140Updated 4 years ago
- Linux Kernel module-less implant (backdoor)☆73Updated 4 years ago
- ☆24Updated 2 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆126Updated 4 years ago
- ☆27Updated 3 years ago
- ☆18Updated 5 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆91Updated 2 years ago
- Winbindex bot to pull in binaries for specific releases☆48Updated 2 years ago