tandasat / CVE-2014-0816View external linksLinks
CVE-2014-0816
☆25Oct 5, 2016Updated 9 years ago
Alternatives and similar repositories for CVE-2014-0816
Users that are interested in CVE-2014-0816 are comparing it to the libraries listed below
Sorting:
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- User-mode program parsing logs created by HyperPlatform☆18Aug 15, 2016Updated 9 years ago
- A windbg extension, extracting token related contents☆41Dec 23, 2020Updated 5 years ago
- Kernel mode driver for writing to physical disk with SL_FORCE_DIRECT_WRITE☆25Aug 14, 2014Updated 11 years ago
- Simple standalone bundle of NT core APIs☆25Mar 7, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/bypass-x64-dse☆20Oct 1, 2015Updated 10 years ago
- ☆22May 25, 2017Updated 8 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- Kernel (Ring0) - SSDT unhook driver☆15Feb 22, 2018Updated 7 years ago
- A command line tool to load and unload a device driver.☆46Jun 10, 2017Updated 8 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- Native module dumper☆13Aug 28, 2017Updated 8 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Windows Kernel Driver - Create a driver device in TDI layer of windows kernel to capture network data packets☆36Jul 21, 2014Updated 11 years ago
- nyā☆70Oct 16, 2015Updated 10 years ago
- Volume Serial number changer☆23Jan 24, 2017Updated 9 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆67Sep 13, 2014Updated 11 years ago
- Dynamic tracing for binary applications (using PIN), IDA plugin to visualize and interact with the traces☆96Mar 24, 2012Updated 13 years ago
- ☆18Mar 20, 2017Updated 8 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- ☆14May 8, 2017Updated 8 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Oct 27, 2011Updated 14 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Windows kernel-mode callbacks tutorial driver☆48Aug 8, 2016Updated 9 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- The dll that can hide itself and then delete itselft.☆32Mar 31, 2013Updated 12 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- ☆19Jul 20, 2015Updated 10 years ago
- hooking KiUserApcDispatcher☆25Apr 3, 2017Updated 8 years ago