tandasat / CVE-2014-0816
CVE-2014-0816
☆25Updated 8 years ago
Alternatives and similar repositories for CVE-2014-0816:
Users that are interested in CVE-2014-0816 are comparing it to the libraries listed below
- ☆28Updated 7 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Updated 9 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 7 years ago
- ☆10Updated 7 years ago
- ☆22Updated 7 years ago
- Kernel Shellcode to add all privileges in token☆13Updated 8 years ago
- ☆18Updated 8 years ago
- reversed emet tool☆24Updated 12 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆34Updated 8 years ago
- Assembly code to use for Windows kernel shellcode to edit winlogon.exe ACL☆13Updated 8 years ago
- Using SEH to bypass CFG☆29Updated 8 years ago
- Kernel-mode file scanner☆18Updated 6 years ago
- Shellcode tracer☆15Updated 8 years ago
- Internet Explorer MemoryProtection Mitigation☆32Updated 10 years ago
- x64 Windows Software Fault Injection Tool☆17Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆14Updated 8 years ago
- Malware monitor template based on MinHook☆16Updated 10 years ago
- Malwarebytes Antivirus CVE☆8Updated 7 years ago
- wow64 syscall filter☆13Updated 10 years ago
- PoC || GTFO Article Materials on Kernel Double Free☆12Updated 7 years ago
- 微软7月布丁增加内存延迟释放机制☆11Updated 10 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 6 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆14Updated 10 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Updated 12 years ago
- Legal access: The driver and console app to demonstrate the basic memory access in kernel mode☆9Updated 7 years ago
- IDA Pro plug-in and tools for displaying 3D graphs of procedures using UbiGraph☆25Updated 11 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- Anti-AV compilation☆42Updated 11 years ago
- Code injection via delay load libraries☆35Updated 7 years ago