peleghd / Windows-10-ExploitationLinks
☆135Updated 5 years ago
Alternatives and similar repositories for Windows-10-Exploitation
Users that are interested in Windows-10-Exploitation are comparing it to the libraries listed below
Sorting:
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 7 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 6 years ago
- ☆99Updated 6 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆68Updated 5 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆94Updated 3 years ago
- ☆90Updated 6 years ago
- September Chrome 1day by István Kurucsai☆82Updated 5 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆90Updated 6 years ago
- Simple library to spray the Windows Kernel Pool☆110Updated 5 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- Web user interface and service agent for the monitoring and remote management of WinAFL.☆54Updated last week
- ☆85Updated last year
- Windows EoP Bugs☆128Updated 5 years ago
- Win32k Exploit by Grant Willcox☆90Updated 6 years ago
- two heap address leak bugs in `usosvc` service☆93Updated 4 years ago
- ☆91Updated 6 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 7 years ago
- HITCON CTF 2018☆45Updated 6 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Updated 6 years ago
- ☆68Updated last year
- Blazefox exploits for Windows 10 RS5 64-bit.☆151Updated 5 years ago
- ☆91Updated 4 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- Windows Graphics Device Interface (GDI+) fuzzer☆129Updated 4 years ago
- ☆22Updated 6 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆88Updated 6 years ago