jonaslyk / exploitkitpub
☆97Updated 3 years ago
Alternatives and similar repositories for exploitkitpub:
Users that are interested in exploitkitpub are comparing it to the libraries listed below
- C# Utilities for Windows Notification Facility☆149Updated this week
- ☆71Updated 2 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆87Updated 3 years ago
- a PE Loader and Windows API tracer. Useful in malware analysis.☆138Updated 2 years ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆187Updated 3 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆226Updated 2 years ago
- Minifilter Callback Patching Proof-of-Concept☆67Updated 2 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆74Updated 3 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆115Updated 2 weeks ago
- Static Binary Instrumentation tool for Windows x64 executables☆201Updated 2 weeks ago
- ☆159Updated 3 years ago
- Recon 2023 slides and code☆79Updated last year
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Updated 2 years ago
- ☆155Updated 2 years ago
- ☆182Updated 2 years ago
- Some of my windows kernel exploits for learning purposes☆123Updated 2 years ago
- This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret …☆246Updated last year
- It's pointy and it hurts!☆125Updated 2 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆244Updated 2 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆121Updated 2 months ago
- Experiment on reproducing Obfuscate & Sleep☆144Updated 4 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆99Updated last year
- ☆143Updated last year
- WTSRM☆209Updated 2 years ago
- ☆105Updated 9 months ago
- Abusing exceptions for code execution.☆110Updated 2 years ago
- miscellaneous scripts and programs☆239Updated 2 months ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆220Updated last year
- Exploitable drivers, you know what I mean☆132Updated last year