theevilbit / kex
☆91Updated 5 years ago
Alternatives and similar repositories for kex:
Users that are interested in kex are comparing it to the libraries listed below
- ☆33Updated 9 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆55Updated 6 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆63Updated 5 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 6 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆67Updated 6 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆86Updated 8 years ago
- ☆89Updated 5 years ago
- exploit development☆49Updated 6 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- Simple library to spray the Windows Kernel Pool☆107Updated 5 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆68Updated 7 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆93Updated 3 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆116Updated 3 months ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆61Updated 7 years ago
- 3D Accelerated Exploitation☆54Updated 5 years ago
- ☆100Updated 6 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 6 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆36Updated 6 years ago
- A Python tool to generate ROP chains☆60Updated 2 weeks ago
- A DBI tool to discover heap memory related bugs☆125Updated 6 years ago
- kernel pool windbg extension☆80Updated 9 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- ☆87Updated 9 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 5 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆116Updated 6 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 8 years ago
- ☆39Updated 3 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆85Updated last year