nmulasmajic / syscall_exploit_CVE-2018-8897
Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).
☆116Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for syscall_exploit_CVE-2018-8897
- Simple library to spray the Windows Kernel Pool☆104Updated 4 years ago
- Reflective SO injection is a library injection technique in which the concept of reflective programming is employed to perform the loadin…☆113Updated 8 years ago
- kernel exploitation helper class☆75Updated 7 years ago
- kernel pool windbg extension☆79Updated 9 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆67Updated 6 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆61Updated 6 years ago
- ☆34Updated 6 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆91Updated 3 years ago
- Windows NT ioctl bruteforcer and modular fuzzer☆119Updated 5 years ago
- ☆73Updated 6 years ago
- Windows RPC Python fuzzer☆155Updated 6 years ago
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆87Updated 10 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 7 years ago
- ☆46Updated 7 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 8 years ago
- ☆62Updated 7 years ago
- ☆33Updated 9 years ago
- Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques☆53Updated 7 years ago
- ☆91Updated 5 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆85Updated 8 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆143Updated 7 years ago
- Load a Windows Kernel Driver☆90Updated 7 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆58Updated 8 years ago
- Process reimaging proof of concept code☆95Updated 5 years ago