rwfpl / rewolf-gogogadget
kernel exploitation helper class
☆76Updated 8 years ago
Alternatives and similar repositories for rewolf-gogogadget:
Users that are interested in rewolf-gogogadget are comparing it to the libraries listed below
- ☆33Updated 9 years ago
- ☆33Updated 7 years ago
- Download all of Microsoft's security updates and symbols☆42Updated 8 years ago
- ☆39Updated 3 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- Local Kernel Debugger (LKD) is a python wrapper around dbgengine.dll☆92Updated 8 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- Exploiting MS15-061 local Privilege escalation☆50Updated 9 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆132Updated 9 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆116Updated 6 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆135Updated 7 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 8 years ago
- ☆91Updated 8 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆50Updated 8 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Updated 8 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆96Updated 12 years ago
- Imports MSDN documentation into IDA Pro☆51Updated 13 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆61Updated 7 years ago
- ☆80Updated 7 years ago
- Windows SMEP Bypass U=S☆37Updated 8 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- Some example source code for fixed IE11 sandbox escapes.☆140Updated 10 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 6 years ago
- Simple library to spray the Windows Kernel Pool☆107Updated 5 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 6 years ago
- ☆51Updated 8 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆89Updated 5 years ago