Some basic info, resources, and code snippets about windows kernel exploitation
☆18Jul 18, 2025Updated 10 months ago
Alternatives and similar repositories for Windows-Kernel-Exploitation
Users that are interested in Windows-Kernel-Exploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Notes template for Offensive Security's EXP-301 course and OSED exam☆21Mar 4, 2022Updated 4 years ago
- Exploit scripts for ctf challenges that involves linux kernel pwning☆18Dec 10, 2024Updated last year
- DLL Injection to Exe with Assembly using OllyDbg☆25Oct 28, 2017Updated 8 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆50Nov 15, 2023Updated 2 years ago
- A Play Ground for learning Kernel.☆11May 3, 2026Updated 2 weeks ago
- Kernel Shellcode to add all privileges in token☆15Mar 13, 2017Updated 9 years ago
- A proof‑of‑concept C2 framework that uses Server‑Sent Events (SSE) and the MCP protocol for agent registration, command dispatch, and res…☆35Apr 28, 2025Updated last year
- tcurl - uses tetsuo socket library.☆24Dec 27, 2025Updated 4 months ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated 2 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 4 months ago
- Three different shellcode techniques on the Windows Kernel☆16Apr 8, 2025Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- PSX provides a collection of common operations that rely on PowerShell like encoding and hosting PowerShell-specific payloads☆12Oct 18, 2023Updated 2 years ago
- ☆49May 7, 2026Updated 2 weeks ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆609Jul 15, 2024Updated last year
- A Windows 11 Rootkit. (Exploit has been patched)☆16Sep 7, 2025Updated 8 months ago
- VulnServer ROP: An Educational Platform for Exploring Buffer Overflow Vulnerabilities and Return-Oriented Programming Techniques☆19Apr 14, 2024Updated 2 years ago
- ☆13Jul 21, 2023Updated 2 years ago
- Unix-like shell for the Atari ST, written in 1992.☆14Mar 10, 2020Updated 6 years ago
- Web based binary analysis☆89Nov 21, 2024Updated last year
- Experimental statically-typed compiled programming language made with LLVM and Rust.☆17Aug 1, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- Signatus - A Vulnerable TCP server to practice Win32 exploitation☆51Jun 13, 2021Updated 4 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Teach Yourself Game Programming in 21 Days☆12Feb 11, 2019Updated 7 years ago
- challenges 2024 woohoo☆22Sep 19, 2024Updated last year
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- A fast and powerful gadget finder and ROP chain generator. A research prototype for the ropbot paper accepted at NDSS'26.☆49Jan 22, 2026Updated 3 months ago
- An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieve…☆21Dec 11, 2024Updated last year
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- (l)user friendly WinDBG theme.☆22Mar 16, 2019Updated 7 years ago
- Python module for demangling rust function names☆19Apr 24, 2021Updated 5 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Here is a collage of reverse engineering topics that I find interesting☆16Dec 10, 2017Updated 8 years ago
- Data Structures and Algorithms. Contribute and Learn together.☆11Oct 11, 2022Updated 3 years ago
- A cryptographically secure password generator that provides high-entropy passwords with configurable requirements. Uses platform-native c…☆23Oct 25, 2024Updated last year