jonaslyk / exploitkitpubLinks
☆96Updated 3 years ago
Alternatives and similar repositories for exploitkitpub
Users that are interested in exploitkitpub are comparing it to the libraries listed below
Sorting:
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆92Updated 3 years ago
- Recon 2023 slides and code☆79Updated 2 years ago
- ☆71Updated 2 years ago
- Some of my windows kernel exploits for learning purposes☆130Updated 3 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆124Updated 5 months ago
- C# Utilities for Windows Notification Facility☆152Updated 3 months ago
- ☆162Updated 3 years ago
- Leverage AMSI (Antimalware Scan Interface) technology to aid your analysis. This tool saves all buffers (scripts, .NET assemblies, etc) …☆109Updated 4 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 3 years ago
- ☆161Updated 2 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆105Updated 2 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 3 years ago
- ☆74Updated last year
- Windows System Programming Experiments☆220Updated 3 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆229Updated 3 years ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- Enumerate various traits from Windows processes as an aid to threat hunting☆187Updated 3 years ago
- Winbindex bot to pull in binaries for specific releases☆48Updated last year
- CVE-2018-6066 using VBA☆66Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆117Updated last year
- POC of a better implementation of GetProcAddress for ntdll using binary search☆109Updated last year
- a PE Loader and Windows API tracer. Useful in malware analysis.☆143Updated 2 years ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆128Updated last month
- Abusing exceptions for code execution.☆111Updated 2 years ago
- ☆82Updated 11 months ago
- Writeups for CTF challenges☆31Updated last year
- Experiment on reproducing Obfuscate & Sleep☆146Updated 4 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆55Updated 3 years ago
- ☆105Updated last year
- ☆146Updated 2 years ago