gerhart01 / hyperv_local_dos_pocLinks
CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code
☆36Updated 4 years ago
Alternatives and similar repositories for hyperv_local_dos_poc
Users that are interested in hyperv_local_dos_poc are comparing it to the libraries listed below
Sorting:
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆58Updated 5 years ago
- ☆40Updated 4 years ago
- ☆47Updated 5 years ago
- ☆33Updated 2 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 3 years ago
- A fast execution trace symbolizer for Windows.☆131Updated last year
- VMX intrinsics plugin for Hex-Rays decompiler☆71Updated 5 years ago
- PoC for CVE-2017-0075☆37Updated 5 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆49Updated 4 years ago
- ☆41Updated 5 years ago
- clone of armadillo patched for windows☆47Updated 9 months ago
- This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)☆41Updated 5 years ago
- AllMemPro☆45Updated 7 years ago
- Windows API listing in JSON format - generated from SDK headers + SDK API documentation☆66Updated 5 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆47Updated 4 years ago
- ☆23Updated 4 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆34Updated 7 years ago
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆24Updated 2 years ago
- Breaking Secure Boot with SMM☆41Updated 3 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Updated 7 years ago
- Helper idapython code for reversing kmdf drivers☆73Updated 3 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆29Updated 8 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated last year
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Updated 6 years ago
- Toolkit for Hyper-V security research☆156Updated 3 years ago
- ☆47Updated 2 years ago
- This is a simple driver with x64 inline assembly☆57Updated 5 years ago
- windbg plugin for win32k debugging☆75Updated 5 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆68Updated 5 years ago