gavz / awesome-windows-exploitationLinks
☆21Updated 5 years ago
Alternatives and similar repositories for awesome-windows-exploitation
Users that are interested in awesome-windows-exploitation are comparing it to the libraries listed below
Sorting:
- ☆31Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Synaptics Audio Driver LPE☆37Updated 6 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- Proof of Concept code for CVE-2020-0728☆47Updated 5 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 5 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- Example for PagedOut!☆25Updated 6 years ago
- ☆51Updated 5 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆45Updated 4 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆16Updated 5 years ago
- ☆30Updated 3 months ago
- ☆90Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆23Updated 6 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- Resources from my journey into Windows binary exploitation☆24Updated 6 years ago
- ACTIVELabs Security Advisories☆23Updated 4 years ago
- ☆24Updated 4 years ago
- Slides from various conference talks☆37Updated 2 years ago
- ☆12Updated 5 years ago
- Experiments on the Windows Internals☆31Updated 6 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆125Updated 5 years ago
- Rekall Memory Forensic Framework☆33Updated 6 years ago
- PoC for CVE-2020-1015☆39Updated 5 years ago
- ☆45Updated 7 years ago
- Tools for analyzing Windows containers and break container's isolation☆32Updated 3 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Updated 5 years ago
- Random CVEs☆34Updated 7 months ago