gerhart01 / hyperv_local_dos_pocLinks
CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code
☆36Updated 4 years ago
Alternatives and similar repositories for hyperv_local_dos_poc
Users that are interested in hyperv_local_dos_poc are comparing it to the libraries listed below
Sorting:
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆57Updated 5 years ago
- ☆41Updated 4 years ago
- A fast execution trace symbolizer for Windows.☆131Updated last year
- VMX intrinsics plugin for Hex-Rays decompiler☆71Updated 5 years ago
- ☆33Updated 2 years ago
- ☆47Updated 5 years ago
- ☆41Updated 5 years ago
- clone of armadillo patched for windows☆47Updated 10 months ago
- AllMemPro☆46Updated 7 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 3 years ago
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Updated 7 years ago
- This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)☆41Updated 5 years ago
- ☆24Updated 4 years ago
- PoC for CVE-2017-0075☆37Updated 5 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated last year
- windbg plugin for win32k debugging☆75Updated 5 years ago
- Windows API listing in JSON format - generated from SDK headers + SDK API documentation☆66Updated 5 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆68Updated 5 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆34Updated 7 years ago
- This is a simple driver with x64 inline assembly☆57Updated 5 years ago
- ☆47Updated 2 years ago
- Helper idapython code for reversing kmdf drivers☆74Updated 3 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆50Updated 5 years ago
- Toolkit for Hyper-V security research☆156Updated 3 years ago
- ☆11Updated 3 years ago
- ☆34Updated 4 years ago
- Breaking Secure Boot with SMM☆41Updated 3 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆47Updated 4 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Updated 8 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago