forrest-orr / ExploitsLinks
A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in conjunction with these exploits.
☆123Updated 3 years ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below
Sorting:
- ☆73Updated 2 years ago
- Google Chrome Use After Free☆61Updated 3 years ago
- Random CVEs☆34Updated 8 months ago
- ☆13Updated 4 years ago
- Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stag…☆89Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆148Updated 3 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 10 months ago
- ☆98Updated 4 years ago
- Inter-Process Communication Mechanisms☆28Updated 5 years ago
- Some of my windows kernel exploits for learning purposes☆134Updated 3 years ago
- ☆90Updated 5 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆235Updated 2 years ago
- ☆55Updated 7 years ago
- Windows internals and exploitation tricks☆112Updated 2 months ago
- ☆18Updated 5 years ago
- ☆74Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆127Updated last year
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆74Updated 3 years ago
- ☆48Updated 5 years ago
- ☆165Updated 4 years ago
- C# Utilities for Windows Notification Facility☆159Updated 8 months ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆125Updated 4 years ago
- Slide of my conference presentations☆14Updated last year
- Linux Kernel module-less implant (backdoor)☆74Updated 4 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30Updated 5 years ago
- ☆27Updated 3 years ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year