gavz / awesome-windows-exploitationLinks
☆21Updated 5 years ago
Alternatives and similar repositories for awesome-windows-exploitation
Users that are interested in awesome-windows-exploitation are comparing it to the libraries listed below
Sorting:
- ☆31Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Synaptics Audio Driver LPE☆37Updated 6 years ago
- ☆24Updated 4 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆45Updated 4 years ago
- Proof of Concept code for CVE-2020-0728☆47Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Updated 5 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- Example for PagedOut!☆25Updated 6 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 5 years ago
- ☆31Updated 4 months ago
- ☆45Updated 7 years ago
- AMSI detection PoC☆31Updated 5 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆25Updated 5 years ago
- A tool to create COM class/interface relationships in neo4j☆50Updated 3 years ago
- PoC for CVE-2020-1015☆39Updated 5 years ago
- A small commented POC for removing API hooks placed by AV/EDR.☆34Updated 5 years ago
- ☆37Updated 4 years ago
- ☆70Updated 11 months ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆39Updated 5 years ago
- Experiments on the Windows Internals☆31Updated 6 years ago
- ☆12Updated 5 years ago
- ☆51Updated 5 years ago
- ☆18Updated 6 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆32Updated 6 years ago
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆23Updated 6 years ago