stong / CVE-2020-15368Links
CVE-2020-15368, aka "How to exploit a vulnerable driver"
☆487Updated 3 years ago
Alternatives and similar repositories for CVE-2020-15368
Users that are interested in CVE-2020-15368 are comparing it to the libraries listed below
Sorting:
- A library to develop kernel level Windows payloads for post HVCI era☆421Updated 4 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆558Updated last year
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆705Updated 4 years ago
- Kernel Exploits☆257Updated 3 years ago
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,138Updated 3 years ago
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆370Updated last week
- Yet another windows internals repo☆206Updated 3 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆619Updated 2 years ago
- Canadian Furious Beaver is a ProcMon-style tool designed only for capturing IRPs sent to any Windows driver.☆324Updated last year
- "Screwed Drivers" centralized information source for code references, links, etc.☆360Updated 5 years ago
- Internals information about Hyper-V☆697Updated last week
- This project provides a collection of Microsoft Windows kernel structures, unions and enumerations. Most of them are not officially docum…☆208Updated 5 months ago
- My notes while studying Windows internals☆433Updated 7 months ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆225Updated 2 years ago
- ROPfuscator is a fine-grained code obfuscation framework for C/C++ programs using ROP (return-oriented programming).☆428Updated last year
- Obfuscate specific windows apis with different apis☆1,006Updated 4 years ago
- My personal cheat sheet for using WinDbg for kernel debugging☆426Updated 3 months ago
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆569Updated 2 years ago
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆538Updated last year
- Examples of leaking Kernel Mode information from User Mode on Windows☆608Updated 8 years ago
- A more stealthy variant of "DLL hollowing"☆350Updated last year
- Useful scripts for WinDbg using the debugger data model☆417Updated last year
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆229Updated 2 years ago
- HyperDeceit is the ultimate all-in-one library that emulates Hyper-V for Windows, giving you the ability to intercept and manipulate oper…☆369Updated 2 years ago
- A collection of various vulnerable (mostly physical memory exposing) drivers.☆394Updated 3 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆664Updated last year
- some gadgets about windows process and ready to use :)☆593Updated last year
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆145Updated 2 years ago
- Extract Windows Defender database from vdm files and unpack it☆444Updated 3 weeks ago
- An obfuscation tool for Windows which instruments the Windows Loader into acting as an unpacking engine.☆305Updated 6 years ago