Various exploits for the HackSys Extreme Vulnerable Driver
☆36Jan 8, 2017Updated 9 years ago
Alternatives and similar repositories for HEVD-Exploits
Users that are interested in HEVD-Exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My curated list of best Stackoverflow questions that I have come across. Contributions are welcome!!☆13Jan 24, 2021Updated 5 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆22Aug 25, 2017Updated 8 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- ☆18Mar 20, 2017Updated 9 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Jan 9, 2017Updated 9 years ago
- ☆50Jun 1, 2017Updated 8 years ago
- ☆15Oct 27, 2015Updated 10 years ago
- windows kernel vulnerability found by me☆89Aug 28, 2017Updated 8 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆43Feb 6, 2019Updated 7 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- ☆142Apr 21, 2017Updated 8 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Nov 29, 2016Updated 9 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆437Aug 22, 2018Updated 7 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- allowing um r/w through km from um ioctl ™☆11Jan 2, 2022Updated 4 years ago
- ☆34Nov 17, 2017Updated 8 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 9 years ago
- i made this simple lite version of dsplit.exe to detect antivirus signature matching☆15Nov 6, 2013Updated 12 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Feb 7, 2017Updated 9 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- API Tracker by Cysinfo Team☆22Oct 12, 2016Updated 9 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Graphical analysis of PDF structure.☆13Jan 9, 2017Updated 9 years ago
- IDA Pro plugin to show functions in a tree view☆115Apr 17, 2021Updated 4 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- ☆48Nov 28, 2016Updated 9 years ago
- A static Internet Explorer Fuzzer.☆50Jun 15, 2017Updated 8 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- ☆24Sep 26, 2021Updated 4 years ago