my learning case about windows
☆21Feb 4, 2022Updated 4 years ago
Alternatives and similar repositories for windows-stuff
Users that are interested in windows-stuff are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- ☆19Oct 2, 2022Updated 3 years ago
- It's a quick HTTPS server.☆14Oct 7, 2022Updated 3 years ago
- lpe poc for cve-2022-21882☆49Feb 7, 2022Updated 4 years ago
- collect☆17Aug 29, 2019Updated 6 years ago
- ☆37Sep 28, 2021Updated 4 years ago
- Notes Template/Checklist for PEN-300 OSEP☆16Nov 20, 2021Updated 4 years ago
- Load shellcode via HELLGATE, Rewrite hellgate with .net framework for learning purpose.☆18Jan 21, 2022Updated 4 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Windows Password Brute by Stas'M☆41Feb 10, 2018Updated 8 years ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12May 28, 2025Updated 9 months ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆35Jul 10, 2024Updated last year
- A .net lib to generate an native coff executable☆13Apr 30, 2015Updated 10 years ago
- A blog where I write stuffs in order to understand them better.☆12Apr 25, 2025Updated 10 months ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆66May 2, 2023Updated 2 years ago
- Execute shellcode with ZwCreateSection, ZwMapViewOfSection, ZwOpenProcess, ZwMapViewOfSection and ZwCreateThreadEx☆15Apr 26, 2021Updated 4 years ago
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆64Apr 22, 2025Updated 11 months ago
- spoof page-table-entry nx bit☆10Feb 16, 2022Updated 4 years ago
- 看起来叫BabyBypass,实际啥都会记一些☆16Sep 10, 2023Updated 2 years ago
- CVE-2019-2890 WebLogic 反序列化RCE漏洞☆44Dec 8, 2019Updated 6 years ago
- ☆36May 27, 2024Updated last year
- An ELF parser written fully in NASM.☆12Oct 20, 2025Updated 5 months ago
- ☆25Jul 7, 2022Updated 3 years ago
- ☆13Jan 12, 2022Updated 4 years ago
- Dump Citrix Secure Access auth cookie from the process memory☆76Jun 24, 2022Updated 3 years ago
- Analysis of syscall sequence pattern from exploit codes for advanced system call sequence filtering for enhanced container security☆16May 21, 2023Updated 2 years ago
- Tips for manually detect & exploit SQL injection Vulnerability : MySQL☆17Aug 17, 2022Updated 3 years ago
- Hookers are cooler than patches.☆170Jan 21, 2022Updated 4 years ago
- Set Up WebDAV Server for Remote File Sharing and more☆35Aug 22, 2019Updated 6 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- Shellcode Loader Engine for Windows☆27Jan 29, 2017Updated 9 years ago
- Simple Protected Mode Kernel for i386☆15Dec 30, 2019Updated 6 years ago
- Shortcut Downloader☆11Jan 11, 2017Updated 9 years ago
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆32Sep 24, 2025Updated 5 months ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- ☆11Nov 7, 2016Updated 9 years ago
- ☆142May 4, 2022Updated 3 years ago
- Use GDI in KernelMode☆26Oct 1, 2022Updated 3 years ago