sctf2020 / Meltdown-PoC-WindowsLinks
Source from https://twitter.com/pwnallthethings. Compiled in VS 2013
☆18Updated 7 years ago
Alternatives and similar repositories for Meltdown-PoC-Windows
Users that are interested in Meltdown-PoC-Windows are comparing it to the libraries listed below
Sorting:
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- https://blog.xpnsec.com/windows-warbird-privesc/☆31Updated 7 years ago
- ☆45Updated 7 years ago
- 来自Freebuf评论区,一个UEFI马.☆47Updated 8 years ago
- Simple windows backdoor command shell.☆21Updated 7 years ago
- Demos for Presentation on Windows Runtime Security☆70Updated 6 years ago
- A repository of example plugins for Relyze Desktop.☆34Updated 5 years ago
- Extend WSH functionality with Registration-Free COM☆26Updated 8 years ago
- Miscellanous scripts used for malware analysis☆22Updated 6 years ago
- A quick POC on how to embed a meterpreter in Firefox via DLL hijacking☆17Updated 8 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆33Updated 7 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- A windbg extension for ASLR/DEP/SafeSEH check☆25Updated 7 years ago
- ☆26Updated 5 years ago
- A simple shellcode runner☆21Updated 11 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆134Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Sample libraries to be used with IAT Patcher☆34Updated 2 years ago
- Dump Windows PE file information in C☆23Updated 10 years ago
- Samples about Microsoft RPC and native API calls in Windows C☆62Updated 8 years ago
- Some of the Anti-Debugging Tricks☆27Updated 8 years ago
- All TMF files that I extracted from Microsoft PDBs.☆13Updated 6 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Updated 8 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Updated 7 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- Source code of my KeygenMe V7 challenge☆22Updated 7 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- A dark theme for WinDBG.☆35Updated 11 years ago
- Game Hacking Adventures Scripts & Tools☆20Updated 12 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 12 years ago