Various exploits for the HackSys Extreme Vulnerable Driver
☆36Jan 8, 2017Updated 9 years ago
Alternatives and similar repositories for HEVD-Exploits
Users that are interested in HEVD-Exploits are comparing it to the libraries listed below
Sorting:
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Aug 25, 2017Updated 8 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- ☆18Mar 20, 2017Updated 8 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- windows kernel vulnerability found by me☆90Aug 28, 2017Updated 8 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Nov 29, 2016Updated 9 years ago
- ☆15Oct 27, 2015Updated 10 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Feb 7, 2017Updated 9 years ago
- IDA Pro plugin to show functions in a tree view☆115Apr 17, 2021Updated 4 years ago
- ☆142Apr 21, 2017Updated 8 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Jan 9, 2017Updated 9 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Mar 22, 2017Updated 8 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆437Aug 22, 2018Updated 7 years ago
- ☆50Jun 1, 2017Updated 8 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 8 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- A static Internet Explorer Fuzzer.☆50Jun 15, 2017Updated 8 years ago
- Misc Python tools or PoCs. Mainly focused in helping RE, fuzzing☆20Aug 31, 2012Updated 13 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- Content from presentation at BHUSA 2017☆180Jul 27, 2017Updated 8 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- ☆39Oct 21, 2016Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- ActionScript ByteCode Disassembler☆16Oct 20, 2015Updated 10 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- ☆11Apr 28, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. It is open-source and has been tested …☆11Apr 2, 2016Updated 9 years ago
- allowing um r/w through km from um ioctl ™☆11Jan 2, 2022Updated 4 years ago