stong / CVE-2020-15368Links
CVE-2020-15368, aka "How to exploit a vulnerable driver"
☆475Updated 3 years ago
Alternatives and similar repositories for CVE-2020-15368
Users that are interested in CVE-2020-15368 are comparing it to the libraries listed below
Sorting:
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆549Updated last year
- A library to develop kernel level Windows payloads for post HVCI era☆408Updated 4 years ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆704Updated 4 years ago
- Internals information about Hyper-V☆690Updated last month
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,126Updated 2 years ago
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆361Updated 7 months ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆610Updated 2 years ago
- Yet another windows internals repo☆207Updated 3 years ago
- Expriments☆458Updated 8 months ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆660Updated last year
- My notes while studying Windows internals☆427Updated 5 months ago
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆566Updated 2 years ago
- Obfuscate specific windows apis with different apis☆1,000Updated 4 years ago
- My personal cheat sheet for using WinDbg for kernel debugging☆420Updated last month
- Canadian Furious Beaver is a ProcMon-style tool designed only for capturing IRPs sent to any Windows driver.☆321Updated last year
- Dynamic unpacker based on PE-sieve☆732Updated last week
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,201Updated last year
- A Pin Tool for tracing API calls etc☆1,442Updated this week
- collect for learning cases☆584Updated 11 months ago
- ROPfuscator is a fine-grained code obfuscation framework for C/C++ programs using ROP (return-oriented programming).☆426Updated last year
- Original C Implementation of the Hell's Gate VX Technique☆1,054Updated 3 years ago
- Windows NT x64 syscall fuzzer☆607Updated last year
- A Binary Genetic Traits Lexer Framework☆494Updated 3 months ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆222Updated last year
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆144Updated 2 years ago
- Yet another variant of Process Hollowing☆397Updated 4 months ago
- some gadgets about windows process and ready to use :)☆587Updated last year
- Examples of leaking Kernel Mode information from User Mode on Windows☆604Updated 7 years ago
- Kernel Exploits☆253Updated 3 years ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆599Updated 4 months ago