PCAUSA Rawether for Windows Local Privilege Escalation
☆39Mar 15, 2017Updated 9 years ago
Alternatives and similar repositories for rewolf-pcausa-exploit
Users that are interested in rewolf-pcausa-exploit are comparing it to the libraries listed below
Sorting:
- kernel exploitation helper class☆77Nov 26, 2016Updated 9 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Mar 15, 2015Updated 11 years ago
- Services and Drivers control application☆19Jul 24, 2017Updated 8 years ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆141Apr 4, 2017Updated 8 years ago
- MSI NTIOLib/WinIO Local Privilege Escalation exploit☆96Sep 26, 2016Updated 9 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆16Oct 18, 2016Updated 9 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- ☆17Mar 3, 2016Updated 10 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- Anti-virus engine in Windows using VC++ 6.0 and MFC. We applied windows multithreading in virus scan method and user interface. Using MFC…☆16Oct 21, 2016Updated 9 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆23May 31, 2017Updated 8 years ago
- analyze the content of the pe file on windows, and shell(pack) function for windows drivers.☆11Nov 9, 2018Updated 7 years ago
- Mortal Kombat GRA files parser. More details at http://blog.rewolf.pl/blog/?p=1837☆16Aug 24, 2018Updated 7 years ago
- User-mode kernel callback framework☆10Nov 16, 2013Updated 12 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Mar 13, 2017Updated 9 years ago
- An alternative tool to Sysinternals WinObj tool (nicer icons!)☆35Aug 31, 2018Updated 7 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- Ssdt Hook Detection tool☆13Nov 11, 2016Updated 9 years ago
- Detect the SCI in windows.☆11Mar 23, 2017Updated 8 years ago
- Hex Studio is a work in progress Hex viewer and editor.☆25Jun 7, 2017Updated 8 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- ☆52Sep 15, 2016Updated 9 years ago
- WIP - Play with Intel VM Extensions☆23Jun 12, 2017Updated 8 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- Virtual Machine Monitor/386 bare metal hypervisor. Run vm86 mode processes on a 386☆13Mar 16, 2016Updated 10 years ago
- XDK is a fully featured C++ wrapper library for Windows kernel development☆21Jan 20, 2016Updated 10 years ago
- ☆21Mar 18, 2019Updated 7 years ago
- Anti-Anti-VM solution via Windows Driver☆62May 8, 2018Updated 7 years ago
- New handle stealing technique for windows apps☆14Oct 6, 2017Updated 8 years ago
- Wow64 syscall hook☆43May 28, 2017Updated 8 years ago