Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where needed.
☆22Aug 25, 2017Updated 8 years ago
Alternatives and similar repositories for HEVD-Exploit-Solutions
Users that are interested in HEVD-Exploit-Solutions are comparing it to the libraries listed below
Sorting:
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Jan 8, 2017Updated 9 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- Simple library to spray the Windows Kernel Pool☆110Jan 6, 2020Updated 6 years ago
- Public repository for HEVD exploits☆19Jun 26, 2018Updated 7 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Oct 24, 2021Updated 4 years ago
- ☆10Jul 30, 2017Updated 8 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- IOCTL-Flooder is a verbose tool designed to help with Windows driver fuzzing by brute forcing IOCTLs on loaded drivers. GetLastError is u…☆11Aug 21, 2018Updated 7 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- ☆26Jan 18, 2026Updated last month
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Jan 9, 2017Updated 9 years ago
- This is a sample that shows how to leverage SetThreadContext for DLL injection☆85Sep 4, 2017Updated 8 years ago
- experiments for IJON☆12Jul 1, 2019Updated 6 years ago
- Services and Drivers control application☆19Jul 24, 2017Updated 8 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing☆10Mar 30, 2016Updated 9 years ago
- prebuild angr wheels for Windows on x86_64☆15Jul 21, 2018Updated 7 years ago
- Ssdt Hook Detection tool☆13Nov 11, 2016Updated 9 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- ☆24Feb 21, 2016Updated 10 years ago
- Crash repro minifier for ASan-instrumented commandline tools.☆12Dec 29, 2019Updated 6 years ago
- This project has been moved from a private repository.☆11May 4, 2018Updated 7 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Mar 3, 2016Updated 10 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- ☆14Jun 24, 2017Updated 8 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- Collection of tools for the Pin dynamic instrumentation framework☆42Jan 21, 2020Updated 6 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 8 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆32Apr 13, 2017Updated 8 years ago
- lkm rootkit☆15May 12, 2014Updated 11 years ago
- Extract Authenticode signature data from PE format file☆18Nov 17, 2019Updated 6 years ago
- ☆63Apr 13, 2017Updated 8 years ago
- Windows inject☆16Jun 7, 2018Updated 7 years ago
- Procmonel is Procmon like monitoring system implemented using Microsoft WDK☆12Dec 25, 2019Updated 6 years ago