stong / CVE-2020-15368
CVE-2020-15368, aka "How to exploit a vulnerable driver"
☆451Updated 2 years ago
Alternatives and similar repositories for CVE-2020-15368:
Users that are interested in CVE-2020-15368 are comparing it to the libraries listed below
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆529Updated 11 months ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆696Updated 4 years ago
- A library to develop kernel level Windows payloads for post HVCI era☆390Updated 3 years ago
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆344Updated 4 months ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆596Updated 2 years ago
- Obfuscate specific windows apis with different apis☆993Updated 4 years ago
- Yet another windows internals repo☆204Updated 3 years ago
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆550Updated 2 years ago
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,081Updated 2 years ago
- Original C Implementation of the Hell's Gate VX Technique☆1,005Updated 3 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆647Updated 11 months ago
- Internals information about Hyper-V☆685Updated 2 months ago
- My notes while studying Windows internals☆411Updated 2 months ago
- Dynamic unpacker based on PE-sieve☆706Updated 3 weeks ago
- collect for learning cases☆576Updated 8 months ago
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆522Updated last year
- Canadian Furious Beaver is a ProcMon-style tool designed only for capturing IRPs sent to any Windows driver.☆316Updated 11 months ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆852Updated 5 years ago
- A more stealthy variant of "DLL hollowing"☆336Updated 11 months ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆137Updated 2 years ago
- My personal cheat sheet for using WinDbg for kernel debugging☆404Updated 4 months ago
- Windows NT x64 syscall fuzzer☆593Updated last year
- "Screwed Drivers" centralized information source for code references, links, etc.☆351Updated 4 years ago
- Kernel Exploits☆248Updated 3 years ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆578Updated last month
- A Pin Tool for tracing API calls etc☆1,385Updated last month
- LoadLibrary for offensive operations☆1,119Updated 3 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆594Updated 7 years ago
- A small bootkit which does not rely on x64 assembly.☆471Updated 5 years ago
- X86 Mutation Engine with Portable Executable compatibility.☆479Updated 2 years ago