CPU-Z Exploit Proof of Concept
☆32Feb 17, 2019Updated 7 years ago
Alternatives and similar repositories for cpuz
Users that are interested in cpuz are comparing it to the libraries listed below
Sorting:
- windows rpc 使用MIDL+RPC实现HelloWorld☆23Mar 21, 2018Updated 7 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit☆24Jul 20, 2021Updated 4 years ago
- ☆24May 17, 2022Updated 3 years ago
- ☆17Oct 31, 2022Updated 3 years ago
- shadow tls☆17Nov 13, 2022Updated 3 years ago
- ☆33Dec 22, 2020Updated 5 years ago
- Hook system calls, context switches, page faults and more.☆34Jul 25, 2019Updated 6 years ago
- x86/x64 dll injector☆31May 17, 2022Updated 3 years ago
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Aug 26, 2017Updated 8 years ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆33Nov 14, 2020Updated 5 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Oct 16, 2019Updated 6 years ago
- VEH Redirect & VEH Debugger☆23May 18, 2020Updated 5 years ago
- ☆49Nov 7, 2024Updated last year
- ☆16Mar 1, 2019Updated 7 years ago
- Experiment to use sections as User/Kernelmode comm vector☆22Apr 7, 2023Updated 2 years ago
- remem is a C++ library designed for memory manipulation, function calling, and pattern scanning. It supports various calling conventions,…☆10Aug 23, 2024Updated last year
- Black Signature Driver☆24Oct 20, 2023Updated 2 years ago
- Windows kernel drivers simple HTTP library for modern C++☆40Jul 12, 2018Updated 7 years ago
- Take the member function of the C++ class as the callback function of the C function☆36Dec 24, 2018Updated 7 years ago
- Force a file delete using a windows kernel driver☆72Jul 29, 2022Updated 3 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- PoC code and tools for Black Hat USA 2024☆24Aug 1, 2024Updated last year
- A REALLY Danger Windows Driver, Turn Any threads Ring0!☆13Aug 11, 2025Updated 6 months ago
- A simple process query/manipulation tool using driver hooked system call. (2019)☆12Aug 30, 2021Updated 4 years ago
- ☆10Aug 16, 2019Updated 6 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- mash hypervisor host pml4☆17Jun 22, 2022Updated 3 years ago
- this application shows EAC sdk's memory leak.☆10Nov 30, 2021Updated 4 years ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- A simple example how to decrypt kernel debugger data block☆32Feb 8, 2021Updated 5 years ago
- Various methods of executing shellcode☆74Mar 27, 2023Updated 2 years ago
- Inject a Dll from memory☆45Sep 10, 2019Updated 6 years ago
- An alternative tool to Sysinternals WinObj tool (nicer icons!)☆35Aug 31, 2018Updated 7 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Multiplatform screen recorder for OpenGL and DirectX☆13Jun 20, 2017Updated 8 years ago
- R3劫持所有异常☆15Jan 4, 2021Updated 5 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago