Public repository for HEVD exploits
☆19Jun 26, 2018Updated 7 years ago
Alternatives and similar repositories for hevd
Users that are interested in hevd are comparing it to the libraries listed below
Sorting:
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Aug 25, 2017Updated 8 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- IOCTL-Flooder is a verbose tool designed to help with Windows driver fuzzing by brute forcing IOCTLs on loaded drivers. GetLastError is u…☆11Aug 21, 2018Updated 7 years ago
- Plugins and signatures☆13Jun 11, 2019Updated 6 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆15May 26, 2019Updated 6 years ago
- ☆35Sep 18, 2015Updated 10 years ago
- ☆19Aug 13, 2015Updated 10 years ago
- CVE-2017-5005 for Quick Heal Antivirus☆15Mar 31, 2017Updated 8 years ago
- CVE-2016-3141☆15Apr 23, 2016Updated 9 years ago
- ☆36Jul 11, 2018Updated 7 years ago
- ☆19Aug 3, 2023Updated 2 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆44Aug 25, 2018Updated 7 years ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- OLE Package Format Documentation☆23Jun 13, 2020Updated 5 years ago
- collection of links related to using and improving windbg☆20Jun 17, 2018Updated 7 years ago
- ☆111May 16, 2017Updated 8 years ago
- A collection of anti disassembly techniques☆20Jul 22, 2017Updated 8 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆21May 29, 2018Updated 7 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- Any useful windbg plugins I've written.☆117Apr 10, 2018Updated 7 years ago
- kernel pool windbg extension☆83Jul 23, 2015Updated 10 years ago
- Tools for static and dynamic analysis of ActionScript3 SWF files.☆46Oct 5, 2018Updated 7 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆26Nov 15, 2012Updated 13 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Jan 23, 2018Updated 8 years ago
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- Local Kernel Debugger (LKD) is a python wrapper around dbgengine.dll☆92Aug 22, 2016Updated 9 years ago
- ☆59Jun 8, 2022Updated 3 years ago
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Oct 21, 2018Updated 7 years ago
- ☆24Oct 30, 2024Updated last year