Security testing tools for Windows sandboxing technologies
☆184May 5, 2025Updated 10 months ago
Alternatives and similar repositories for SandboxSecurityTools
Users that are interested in SandboxSecurityTools are comparing it to the libraries listed below
Sorting:
- Launch Windows executables & COM servers in a sandboxed or elevated process.☆48Jan 27, 2026Updated last month
- ☆12Jul 27, 2020Updated 5 years ago
- Static Binary Instrumentation tool for Windows x64 executables☆206Sep 29, 2025Updated 5 months ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆214Jul 2, 2020Updated 5 years ago
- POC For CVE-2022-24483☆14Apr 12, 2022Updated 3 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆260Sep 1, 2022Updated 3 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆15Apr 15, 2020Updated 5 years ago
- M2-Team Common Library☆15Apr 16, 2019Updated 6 years ago
- Some eternal WIP stuff :)☆21Nov 18, 2025Updated 4 months ago
- Run the program with the specified permission level (C++20 required)☆378Dec 20, 2025Updated 3 months ago
- This respository is a collection of C# class libraries which implement RPC clients for various versions of the Windows Operating System f…☆285May 14, 2020Updated 5 years ago
- pwn++ is a Windows & Linux library oriented for exploit dev but mostly used to play with modern C++ features☆171Jun 9, 2025Updated 9 months ago
- PoC demonstrating the use of cve-2020-1034 for privilege escalation☆126Mar 16, 2021Updated 5 years ago
- Dump of win32k POCs for bugs I've found☆380Mar 6, 2022Updated 4 years ago
- INF Studio for easier working with driver installation files☆39Nov 11, 2023Updated 2 years ago
- ☆149Jun 5, 2023Updated 2 years ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆30Jun 7, 2025Updated 9 months ago
- Exploring RPC interfaces on Windows☆346Jan 30, 2024Updated 2 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆51Dec 16, 2020Updated 5 years ago
- Internals information about Hyper-V☆733Mar 7, 2026Updated last week
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆51Jun 1, 2025Updated 9 months ago
- Security Research from the Microsoft Security Response Center (MSRC)☆1,379Aug 8, 2024Updated last year
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115May 21, 2023Updated 2 years ago
- ☆41Jun 6, 2021Updated 4 years ago
- ☆18Mar 28, 2023Updated 2 years ago
- ☆138Aug 3, 2021Updated 4 years ago
- ☆17Jun 30, 2020Updated 5 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆250Jul 5, 2022Updated 3 years ago
- A toy Fuzzer for wasm fuzzing based on fuzzilli☆72Apr 8, 2022Updated 3 years ago
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,737Jan 2, 2026Updated 2 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆271Aug 31, 2022Updated 3 years ago
- JavaScript Fuzzing framework for v8☆144Jan 24, 2022Updated 4 years ago
- Some Code Samples for Windows based Inter-Process-Communication (IPC)☆211Feb 29, 2024Updated 2 years ago
- RPC Monitor tool based on Event Tracing for Windows☆388Aug 19, 2024Updated last year
- Web user interface and service agent for the monitoring and remote management of WinAFL.☆63Feb 24, 2026Updated 3 weeks ago
- Ghidra data type archive for Windows driver analysis☆30Oct 10, 2024Updated last year
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆82Nov 14, 2022Updated 3 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆635Jul 7, 2017Updated 8 years ago