HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
☆2,992Feb 24, 2025Updated last year
Alternatives and similar repositories for HackSysExtremeVulnerableDriver
Users that are interested in HackSysExtremeVulnerableDriver are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A fork of AFL for fuzzing Windows binaries☆2,556Mar 13, 2026Updated last month
- A repository for learning various heap exploitation techniques.☆8,606Updated this week
- Examples of leaking Kernel Mode information from User Mode on Windows☆641Jul 7, 2017Updated 8 years ago
- Resources for Windows exploit development☆1,652Dec 20, 2021Updated 4 years ago
- windows kernel security development☆2,062Sep 6, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆2,147Sep 14, 2025Updated 7 months ago
- A Coverage Explorer for Reverse Engineers☆2,538Feb 14, 2026Updated 2 months ago
- Set of tools to analyze Windows sandboxes for exposed attack surface.☆2,285Nov 6, 2025Updated 5 months ago
- List of Awesome Advanced Windows Exploitation References☆1,560Jan 13, 2022Updated 4 years ago
- Windows Kernel Drivers fuzzer☆377Mar 15, 2017Updated 9 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,933Apr 1, 2026Updated 3 weeks ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆416Jan 2, 2020Updated 6 years ago
- A collection of links related to Linux kernel security and exploitation☆6,419Mar 7, 2026Updated last month
- Internals information about Hyper-V☆735Mar 7, 2026Updated last month
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A collection of links related to VMware escape exploits☆1,492Sep 4, 2024Updated last year
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆440Aug 22, 2018Updated 7 years ago
- State-of-the-art native debugging tools☆3,745Apr 22, 2026Updated last week
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,752Jan 2, 2026Updated 3 months ago
- Diaphora, the most advanced Free and Open Source program diffing tool.☆4,250Nov 24, 2024Updated last year
- Intel VT-x based hypervisor aiming to provide a thin VM-exit filtering platform on Windows.☆1,743Nov 24, 2023Updated 2 years ago
- Cross Platform Kernel Fuzzer Framework☆455Oct 11, 2018Updated 7 years ago
- Defeating Windows User Account Control☆7,523Feb 17, 2026Updated 2 months ago
- Kernel Driver Utility☆2,516Apr 2, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆748Nov 1, 2024Updated last year
- Course materials for Modern Binary Exploitation by RPISEC☆5,967Dec 9, 2021Updated 4 years ago
- Hook system calls, context switches, page faults and more.☆2,646May 9, 2023Updated 2 years ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,282May 1, 2024Updated last year
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆214Jul 2, 2020Updated 5 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,519Nov 15, 2023Updated 2 years ago
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,618Jun 11, 2025Updated 10 months ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,806Apr 3, 2024Updated 2 years ago
- ret-sync is a set of plugins that helps to synchronize a debugging session (WinDbg/GDB/LLDB/OllyDbg2/x64dbg) with IDA/Ghidra/Binary Ninja…☆2,333Feb 15, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Pin Tool for tracing API calls etc☆1,649Feb 8, 2026Updated 2 months ago
- awesome list of browser exploitation tutorials☆2,280Sep 18, 2023Updated 2 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆449Apr 11, 2025Updated last year
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,646Apr 18, 2026Updated last week
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,327Mar 2, 2026Updated last month
- Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software v…☆4,148Apr 15, 2026Updated 2 weeks ago
- ☆850Dec 13, 2022Updated 3 years ago