tandasat / CVE-2014-0816
CVE-2014-0816
☆25Updated 8 years ago
Alternatives and similar repositories for CVE-2014-0816:
Users that are interested in CVE-2014-0816 are comparing it to the libraries listed below
- ☆28Updated 7 years ago
- ☆22Updated 7 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Updated 9 years ago
- ☆10Updated 7 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 7 years ago
- Anti-AV compilation☆42Updated 11 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆34Updated 8 years ago
- wow64 syscall filter☆13Updated 10 years ago
- Kernel-mode file scanner☆18Updated 6 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 8 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Updated 12 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆14Updated 7 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Internet Explorer MemoryProtection Mitigation☆32Updated 10 years ago
- Using SEH to bypass CFG☆29Updated 7 years ago
- reversed emet tool☆24Updated 12 years ago
- ☆10Updated 10 years ago
- x64 Windows Software Fault Injection Tool☆17Updated 7 years ago
- Intel PIN rocks☆15Updated 12 years ago
- Malware monitor template based on MinHook☆16Updated 9 years ago
- Malwarebytes Antivirus CVE☆8Updated 7 years ago
- ☆18Updated 8 years ago
- Code Injector Using Code Caves☆14Updated 9 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆14Updated 10 years ago
- ☆15Updated 9 years ago
- Shellcode tracer☆15Updated 8 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 11 years ago
- Assembly code to use for Windows kernel shellcode to edit winlogon.exe ACL☆13Updated 8 years ago
- ☆12Updated 7 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Updated 7 years ago