theevilbit / kexLinks
☆91Updated 6 years ago
Alternatives and similar repositories for kex
Users that are interested in kex are comparing it to the libraries listed below
Sorting:
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- ☆35Updated 9 years ago
- WinHeap Explorer repository.☆120Updated 6 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- exploit development☆49Updated 7 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- ☆39Updated 4 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Collection of pin tools☆52Updated 9 years ago
- kernel exploitation helper class☆77Updated 8 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆94Updated 3 years ago
- ☆33Updated 8 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 6 years ago
- Simple library to spray the Windows Kernel Pool☆110Updated 5 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Updated 10 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆64Updated 5 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 7 years ago
- A Python tool to generate ROP chains☆64Updated 6 months ago
- ☆99Updated 6 years ago
- A fuzz job for ClamAV☆31Updated 9 years ago
- HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass☆65Updated 7 years ago
- ☆45Updated 7 years ago
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆85Updated 9 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Updated 8 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆39Updated 8 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 6 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆117Updated 6 years ago
- ☆43Updated 6 years ago