☆91Jul 31, 2019Updated 6 years ago
Alternatives and similar repositories for kex
Users that are interested in kex are comparing it to the libraries listed below
Sorting:
- ☆89May 9, 2019Updated 6 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Mar 20, 2021Updated 4 years ago
- Linux kASLR (Intel TSX/RTM) bypass static library☆80Oct 15, 2017Updated 8 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- Debugger with hardware breakpoints and memory watchpoints for BCM4339 Wi-Fi chips☆56Dec 23, 2017Updated 8 years ago
- Simple library to spray the Windows Kernel Pool☆110Jan 6, 2020Updated 6 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆310Feb 24, 2019Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆159Mar 30, 2018Updated 7 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆172Dec 7, 2016Updated 9 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆302Jan 12, 2023Updated 3 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆148Jul 30, 2017Updated 8 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆415Jan 2, 2020Updated 6 years ago
- ☆17May 13, 2019Updated 6 years ago
- PEDA-like debugger UI for WinDbg☆206Mar 29, 2024Updated last year
- Symbol REPL☆31Mar 4, 2018Updated 7 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- a grammar based feedback fuzzer☆166Jul 1, 2023Updated 2 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Jul 27, 2017Updated 8 years ago
- PoC☆212Jan 13, 2025Updated last year
- HitCon 2016 Windows 10 x64 edge 0day and exploit☆109Jul 26, 2016Updated 9 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 6 years ago
- A set of exploitation/reversing aids for IDA☆421Nov 28, 2017Updated 8 years ago
- A DBI tool to discover heap memory related bugs☆125Jun 25, 2018Updated 7 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Hypervisor-based debugger☆191Dec 2, 2020Updated 5 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- clang-based search engine for C/C++ data structures, classes, prototypes & macros☆103Jul 15, 2025Updated 7 months ago
- A stateful fuzzing engine.☆45Nov 14, 2018Updated 7 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆225Jul 2, 2025Updated 8 months ago
- Simple No-meaning Assembly Omitter for IDA Pro (This is just a prototype)☆284May 5, 2021Updated 4 years ago
- extending IDA's string navigation capabilities☆174Oct 25, 2020Updated 5 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆91Feb 15, 2019Updated 7 years ago
- Recover mutation graph from an AFL seed☆60Jan 6, 2021Updated 5 years ago
- A Javascript library for browser exploitation☆894Feb 12, 2019Updated 7 years ago