ghostbyt3 / WinDriver-EXPLinks
This repo contains PoCs for vulnerable Windows drivers.
☆20Updated 3 weeks ago
Alternatives and similar repositories for WinDriver-EXP
Users that are interested in WinDriver-EXP are comparing it to the libraries listed below
Sorting:
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆119Updated last year
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆123Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆137Updated 4 months ago
- ☆160Updated 6 months ago
- ☆137Updated 11 months ago
- A Mythic Agent written in PIC C.☆207Updated 11 months ago
- A hoontr must hoont☆100Updated last month
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆194Updated last year
- "Service-less" driver loading☆167Updated last year
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆324Updated 2 months ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆104Updated last year
- ☆29Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated last year
- Activation Context Hijack☆168Updated 5 months ago
- ☆125Updated 3 weeks ago
- ForsHops☆152Updated 9 months ago
- ☆159Updated last year
- Windows x64 Exploitation Training☆15Updated 7 months ago
- Internal Monologue BOF☆79Updated last year
- Impersonate Tokens using only NTAPI functions☆83Updated 9 months ago
- Shellcode injection using the Windows Debugging API☆124Updated last week
- Find DLLs with RWX section☆80Updated 2 years ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆73Updated 5 months ago
- Boilerplate to develop raw and truly Position Independent Code (PIC).☆114Updated 11 months ago
- A collection of position independent coding resources☆105Updated last month
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)☆128Updated 2 months ago
- A small How-To on creating your own weaponized WSL file☆119Updated 5 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆278Updated last year
- Blog/Journal on how to backdoor VSCode extensions☆76Updated 5 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 9 months ago