the-deniss / Vulnerability-Disclosures
Vulnerability analysis and proof of concepts
☆34Updated last year
Alternatives and similar repositories for Vulnerability-Disclosures:
Users that are interested in Vulnerability-Disclosures are comparing it to the libraries listed below
- A PoC tool for exploiting leaked process and thread handles☆30Updated 11 months ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆19Updated 2 years ago
- LPE of CVE-2024-26230☆20Updated 4 months ago
- ☆57Updated last year
- ☆59Updated 2 years ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- Analysis of the vulnerability☆48Updated 11 months ago
- ☆26Updated 3 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆21Updated 8 months ago
- ☆40Updated 3 years ago
- CSharp Writeups for HackSys Extreme Vulnerable Driver☆43Updated 3 years ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆44Updated 3 months ago
- Enabled / Disable LSA Protection via BYOVD☆65Updated 3 years ago
- ☆15Updated this week
- Example for PagedOut!☆24Updated 5 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆54Updated 2 years ago
- ☆54Updated 2 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆96Updated 4 years ago
- ☆49Updated 2 years ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆25Updated last year
- ☆11Updated 2 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆46Updated 8 months ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆20Updated 4 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆35Updated 2 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆24Updated last year
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆38Updated 4 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆39Updated 3 years ago