☆135Dec 15, 2019Updated 6 years ago
Alternatives and similar repositories for Windows-10-Exploitation
Users that are interested in Windows-10-Exploitation are comparing it to the libraries listed below
Sorting:
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- ☆152Jan 7, 2020Updated 6 years ago
- A repository for my conference presentations☆35Feb 18, 2020Updated 6 years ago
- EoP POC for CVE-2019-1132☆61Sep 8, 2019Updated 6 years ago
- The exploit for Panda AV LPE☆37May 22, 2019Updated 6 years ago
- Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM☆117Dec 12, 2019Updated 6 years ago
- win32k use-after-free poc☆71Apr 22, 2020Updated 5 years ago
- Win32k Exploit by Grant Willcox☆91May 17, 2019Updated 6 years ago
- Dump of win32k POCs for bugs I've found☆380Mar 6, 2022Updated 3 years ago
- ☆48Jun 30, 2020Updated 5 years ago
- VirtualBox 3D exploits & PoCs☆162Jan 24, 2019Updated 7 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- sploit☆67Dec 21, 2019Updated 6 years ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆624Jun 13, 2020Updated 5 years ago
- cve-2019-0808-poc☆48Mar 25, 2019Updated 6 years ago
- Exploit for CVE-2019-9810 Firefox on Windows 64-bit.☆228Dec 28, 2019Updated 6 years ago
- This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.☆225May 15, 2020Updated 5 years ago
- Local privilege escalation PoC exploit for CVE-2019-16098☆201Sep 13, 2019Updated 6 years ago
- Proof-of-concept code for various bugs☆112Oct 30, 2024Updated last year
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆58Jun 21, 2020Updated 5 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆69Dec 2, 2019Updated 6 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆443Apr 11, 2025Updated 10 months ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆425Mar 20, 2022Updated 3 years ago
- POC viruses I have created to demo some ideas☆59Apr 12, 2020Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- Windows - Weaponizing privileged file writes with the Update Session Orchestrator service☆402Jun 6, 2020Updated 5 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆215Jul 2, 2020Updated 5 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Jul 20, 2019Updated 6 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆240Nov 6, 2019Updated 6 years ago
- CVE-2019-0859 1day Exploit☆119Feb 11, 2020Updated 6 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- Various debugging tools such as %DumpObjects for v8☆56Jan 23, 2019Updated 7 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Feb 24, 2019Updated 7 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- Proof of Concept code for CVE-2020-0728☆47Feb 12, 2020Updated 6 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago