Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where needed.
☆22Aug 25, 2017Updated 8 years ago
Alternatives and similar repositories for HEVD-Exploit-Solutions
Users that are interested in HEVD-Exploit-Solutions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆31Jan 4, 2018Updated 8 years ago
- Tool to display a Windows 8+ process mitigation policy☆12Jul 9, 2025Updated 8 months ago
- IOCTL-Flooder is a verbose tool designed to help with Windows driver fuzzing by brute forcing IOCTLs on loaded drivers. GetLastError is u…☆11Aug 21, 2018Updated 7 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Jan 9, 2017Updated 9 years ago
- Simple library to spray the Windows Kernel Pool☆110Jan 6, 2020Updated 6 years ago
- Public repository for HEVD exploits☆19Jun 26, 2018Updated 7 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Jan 8, 2017Updated 9 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Oct 24, 2021Updated 4 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Jan 23, 2018Updated 8 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- Windows inject☆17Jun 7, 2018Updated 7 years ago
- Services and Drivers control application☆19Jul 24, 2017Updated 8 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Mar 3, 2016Updated 10 years ago
- ☆34Nov 17, 2017Updated 8 years ago
- Slides of 44Con 2018☆23Oct 11, 2018Updated 7 years ago
- ☆63Apr 13, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit using GDI☆19Mar 15, 2017Updated 9 years ago
- ☆14Jun 24, 2017Updated 8 years ago
- ☆29Sep 18, 2015Updated 10 years ago
- ☆10Jul 30, 2017Updated 8 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- Collection of tools for the Pin dynamic instrumentation framework☆42Jan 21, 2020Updated 6 years ago
- This is a sample that shows how to leverage SetThreadContext for DLL injection☆85Sep 4, 2017Updated 8 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆32Apr 13, 2017Updated 8 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- Ssdt Hook Detection tool☆13Nov 11, 2016Updated 9 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- OpenType font file format fuzzer for Windows☆52Jun 8, 2013Updated 12 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 9 years ago
- Python wrapper for the Windows CDB Debugger☆20Feb 9, 2022Updated 4 years ago
- An ark tool's driver☆40May 11, 2017Updated 8 years ago
- ☆24Feb 21, 2016Updated 10 years ago
- ☆22May 25, 2017Updated 8 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆147Jul 30, 2017Updated 8 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago