gdabah / win32k-bugsLinks
Dump of win32k POCs for bugs I've found
☆380Updated 3 years ago
Alternatives and similar repositories for win32k-bugs
Users that are interested in win32k-bugs are comparing it to the libraries listed below
Sorting:
- Tools for instrumenting Windows Defender's mpengine.dll☆304Updated 6 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆619Updated 8 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆428Updated 5 months ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆734Updated 10 months ago
- CFB is a ProcMon-style tool designed to assist capturing IRPs sent to Windows drivers.☆330Updated last year
- ☆236Updated 8 years ago
- Windows Kernel Drivers fuzzer☆370Updated 8 years ago
- A bunch of JavaScript extensions for WinDbg.☆345Updated 9 months ago
- Have fun with the LowFragmentationHeap☆244Updated 4 years ago
- Idapython script to carve binary for internal RPC structures☆239Updated last year
- POC for cve-2019-1458☆177Updated 3 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆240Updated 3 years ago
- Extract Windows Defender database from vdm files and unpack it☆458Updated last month
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆211Updated 5 years ago
- Toy scripts for playing with WinDbg JS API☆237Updated last year
- My personal cheat sheet for using WinDbg for kernel debugging☆437Updated 4 months ago
- Checksec, but for Windows: static detection of security mitigations in executables☆601Updated 8 months ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆436Updated 7 years ago
- collect for learning cases☆593Updated last year
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆407Updated 5 years ago
- Public repository for windbglib, a wrapper around pykd.pyd (for Windbg), used by mona.py