forrest-orr / ExploitsLinks
A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in conjunction with these exploits.
☆121Updated 2 years ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below
Sorting:
- ☆72Updated last year
- ☆50Updated 6 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated last year
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆146Updated 3 years ago
- Some of my windows kernel exploits for learning purposes☆129Updated 3 years ago
- Google Chrome Use After Free☆57Updated 3 years ago
- ☆74Updated last year
- ☆96Updated 3 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆127Updated last year
- Aplos an extremely simple fuzzer for Windows binaries.☆69Updated 4 months ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆127Updated last week
- Inter-Process Communication Mechanisms☆28Updated 4 years ago
- ☆63Updated last year
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆116Updated last year
- ☆12Updated 4 years ago
- Windows internals and exploitation tricks☆102Updated 3 weeks ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆125Updated 4 years ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆187Updated 3 years ago
- ☆48Updated 5 years ago
- Linux process injection PoCs☆31Updated last year
- ☆27Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 3 years ago
- Slide of my conference presentations☆14Updated 10 months ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆70Updated 3 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆225Updated 2 years ago
- Leveraging patch diffing to discover new vulnerabilities☆124Updated 8 months ago
- Random CVEs☆32Updated 2 months ago
- ☆113Updated 3 years ago