stong / CVE-2020-15368Links
CVE-2020-15368, aka "How to exploit a vulnerable driver"
☆499Updated 3 years ago
Alternatives and similar repositories for CVE-2020-15368
Users that are interested in CVE-2020-15368 are comparing it to the libraries listed below
Sorting:
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆564Updated last year
- A library to develop kernel level Windows payloads for post HVCI era☆447Updated 4 years ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆706Updated 5 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆627Updated 3 years ago
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆379Updated 2 months ago
- CFB is a ProcMon-style tool designed to assist capturing IRPs sent to Windows drivers.☆330Updated last year
- Yet another windows internals repo☆207Updated 4 years ago
- Kernel Exploits☆259Updated 4 years ago
- Internals information about Hyper-V☆707Updated 3 weeks ago
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,161Updated 3 years ago
- My notes while studying Windows internals☆436Updated 9 months ago
- Obfuscate specific windows apis with different apis☆1,008Updated 4 years ago
- "Screwed Drivers" centralized information source for code references, links, etc.☆366Updated 5 years ago
- My personal cheat sheet for using WinDbg for kernel debugging☆437Updated 4 months ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆833Updated last year
- This project provides a collection of Microsoft Windows kernel structures, unions and enumerations. Most of them are not officially docum…☆215Updated 7 months ago
- ROPfuscator is a fine-grained code obfuscation framework for C/C++ programs using ROP (return-oriented programming).☆432Updated last year
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆665Updated last year
- Yet another variant of Process Hollowing☆417Updated last month
- Examples of leaking Kernel Mode information from User Mode on Windows☆619Updated 8 years ago
- HashDB API hash lookup plugin for IDA Pro☆331Updated 3 months ago
- collect for learning cases☆593Updated last year
- Expriments☆467Updated 11 months ago
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆577Updated 2 years ago
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆548Updated 2 years ago
- some gadgets about windows process and ready to use :)☆609Updated last year
- HyperDeceit is the ultimate all-in-one library that emulates Hyper-V for Windows, giving you the ability to intercept and manipulate oper…☆376Updated 2 years ago
- Time Travel Debugging IDA plugin☆591Updated last year
- 🗜️ A packer for Windows x86 executable files written in C and Intel x86 Assembly. The new file after packing can obstruct reverse engine…☆344Updated 10 months ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆159Updated 2 years ago