hardik05 / python
python scripts
☆15Updated 5 years ago
Alternatives and similar repositories for python:
Users that are interested in python are comparing it to the libraries listed below
- ☆50Updated 7 years ago
- ☆33Updated 9 years ago
- ☆44Updated 6 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- Automatically exported from code.google.com/p/ioctlbf☆16Updated 9 years ago
- A fuzz job for ClamAV☆31Updated 8 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆36Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆31Updated 9 years ago
- Slides of 44Con 2018☆21Updated 6 years ago
- ☆28Updated 7 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 6 years ago
- My conference presentations and publications☆26Updated 2 years ago
- Windows SMEP Bypass U=S☆37Updated 8 years ago
- A windbg extension for ASLR/DEP/SafeSEH check☆25Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 6 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆93Updated 3 years ago
- ☆34Updated 7 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 7 years ago
- winAFL patch to enable network-based apps fuzzing☆37Updated 6 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 5 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆61Updated 7 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 6 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- ☆51Updated 7 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆64Updated 10 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 5 years ago
- Exploit development library for python users☆11Updated 2 years ago