gavz / awesome-windows-exploitationLinks
☆21Updated 5 years ago
Alternatives and similar repositories for awesome-windows-exploitation
Users that are interested in awesome-windows-exploitation are comparing it to the libraries listed below
Sorting:
- ☆31Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- Synaptics Audio Driver LPE☆37Updated 6 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- Proof of Concept code for CVE-2020-0728☆47Updated 5 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆45Updated 4 years ago
- ☆24Updated 4 years ago
- ☆30Updated 4 months ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆16Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Updated 5 years ago
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆24Updated 6 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆32Updated 6 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 5 years ago
- PoC for CVE-2020-1015☆39Updated 5 years ago
- ☆51Updated 5 years ago
- Example for PagedOut!☆25Updated 6 years ago
- ☆12Updated 5 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 5 years ago
- Example RPC service for blog post☆17Updated 6 years ago
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- An opensource API hooking framework☆22Updated 6 years ago
- ☆45Updated 7 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- Super IOCTL Basic Fuzzer☆15Updated 6 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- ☆91Updated 5 years ago
- ☆70Updated 11 months ago
- Experiments on the Windows Internals☆31Updated 6 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆92Updated 7 years ago