stong / CVE-2020-15368
CVE-2020-15368, aka "How to exploit a vulnerable driver"
☆471Updated 3 years ago
Alternatives and similar repositories for CVE-2020-15368:
Users that are interested in CVE-2020-15368 are comparing it to the libraries listed below
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆543Updated last year
- A library to develop kernel level Windows payloads for post HVCI era☆398Updated 3 years ago
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,109Updated 2 years ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆700Updated 4 years ago
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆354Updated 6 months ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆658Updated last year
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆607Updated 2 years ago
- Obfuscate specific windows apis with different apis☆1,000Updated 4 years ago
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆558Updated 2 years ago
- Yet another windows internals repo☆207Updated 3 years ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆799Updated last year
- Original C Implementation of the Hell's Gate VX Technique☆1,029Updated 3 years ago
- Dynamic unpacker based on PE-sieve☆727Updated last month
- PoC Implementation of a fully dynamic call stack spoofer☆767Updated 9 months ago
- My personal cheat sheet for using WinDbg for kernel debugging☆417Updated last week
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,166Updated last year
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆591Updated 3 months ago
- A more stealthy variant of "DLL hollowing"☆347Updated last year
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆867Updated 5 years ago
- This project provides a collection of Microsoft Windows kernel structures, unions and enumerations. Most of them are not officially docum…☆199Updated 2 months ago
- My notes while studying Windows internals☆425Updated 4 months ago
- Yet another variant of Process Hollowing☆391Updated 3 months ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆597Updated 7 years ago
- ROPfuscator is a fine-grained code obfuscation framework for C/C++ programs using ROP (return-oriented programming).☆426Updated 11 months ago
- "Screwed Drivers" centralized information source for code references, links, etc.☆356Updated 5 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆221Updated last year
- Internals information about Hyper-V☆689Updated 3 months ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆740Updated last year
- Expriments☆454Updated 6 months ago
- Extract Windows Defender database from vdm files and unpack it☆440Updated 5 years ago