gavz / awesome-windows-exploitationLinks
☆21Updated 4 years ago
Alternatives and similar repositories for awesome-windows-exploitation
Users that are interested in awesome-windows-exploitation are comparing it to the libraries listed below
Sorting:
- ☆31Updated 4 years ago
- Synaptics Audio Driver LPE☆37Updated 6 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- ☆26Updated 7 years ago
- ☆49Updated 5 years ago
- Example for PagedOut!☆25Updated 5 years ago
- Proof of Concept code for CVE-2020-0728☆46Updated 5 years ago
- Resources from my journey into Windows binary exploitation☆23Updated 6 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- ACTIVELabs Security Advisories☆23Updated 4 years ago
- Win32k Elevation of Privilege Poc☆1Updated 6 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆49Updated 4 years ago
- GUI Application in C# to run and disassemble shellcode☆35Updated 7 years ago
- Proof of concept of VMSA-2017-0012☆41Updated 7 years ago
- NT AUTHORITY\SYSTEM☆38Updated 5 years ago
- ☆24Updated 3 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- PoC for CVE-2020-1015☆40Updated 5 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆15Updated 5 years ago
- Windows syscall fuzzer that I used in 2017 & 2018. Not much to say about it but maybe helpful to someone. At least syscall information it…☆20Updated 5 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 6 years ago
- ☆28Updated 4 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Updated 6 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Updated 4 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆98Updated 5 years ago
- Experiments on the Windows Internals☆30Updated 5 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆23Updated 4 years ago
- ☆28Updated 8 months ago
- CVE-2020-5837 exploit☆41Updated 5 years ago
- ☆18Updated 6 years ago