houjingyi233 / ALPC-fuzz-studyLinks
☆26Updated 7 years ago
Alternatives and similar repositories for ALPC-fuzz-study
Users that are interested in ALPC-fuzz-study are comparing it to the libraries listed below
Sorting:
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- POC For CVE-2022-24483☆14Updated 3 years ago
- A exe loader that can load NScript evaluation engine of Windows Defender/Microsft Security Essential. You can fuzz NScript by using this.…☆28Updated 8 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆14Updated 5 years ago
- exploit termdd.sys(support kb4499175)☆61Updated 6 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- Example for PagedOut!☆25Updated 6 years ago
- Resources from my journey into Windows binary exploitation☆24Updated 7 years ago
- ☆12Updated 5 years ago
- May the POC be with you☆65Updated last month
- Analysis of VBS exploit CVE-2018-8174☆31Updated 7 years ago
- Code for diskless loading of ELF Shared Library using Reflective DLL Injection☆53Updated 9 years ago
- ☆12Updated 4 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆49Updated 5 years ago
- ☆31Updated 5 years ago
- ☆20Updated 5 years ago
- CVE-2019-9729. Transferred from https://github.com/DoubleLabyrinth/SdoKeyCrypt-sys-local-privilege-elevation☆83Updated 6 years ago
- Ruby ALPC Fuzzer ( joke )☆24Updated 11 years ago
- ☆33Updated 4 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Updated 7 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Updated 6 years ago
- ☆28Updated 7 years ago
- ☆49Updated 5 years ago
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Updated 7 years ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆126Updated 4 years ago
- Proof of Concept code for CVE-2020-0728☆47Updated 5 years ago
- Windows syscall fuzzer that I used in 2017 & 2018. Not much to say about it but maybe helpful to someone. At least syscall information it…☆20Updated 6 years ago
- A kernel mode Windows rootkit in development.☆49Updated 4 years ago
- win32k use-after-free poc☆71Updated 5 years ago
- An command-line RPC method enumerator, born out of RPCView's awesomeness☆108Updated 6 years ago