Some basic info, resources, and code snippets about windows kernel exploitation
☆17Jul 18, 2025Updated 7 months ago
Alternatives and similar repositories for Windows-Kernel-Exploitation
Users that are interested in Windows-Kernel-Exploitation are comparing it to the libraries listed below
Sorting:
- Notes template for Offensive Security's EXP-301 course and OSED exam☆21Mar 4, 2022Updated 3 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆52Nov 15, 2023Updated 2 years ago
- GPP CPassword Decryption Tools☆12Jun 13, 2022Updated 3 years ago
- Download images and convert it to pdf (NSFW: A+)☆14Mar 29, 2025Updated 11 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- A curated list of resources for the OSED journey.☆72Feb 3, 2022Updated 4 years ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆128Aug 11, 2023Updated 2 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- Personal pentest notes and playbooks<3☆32Jan 7, 2026Updated last month
- Data Structures and Algorithms. Contribute and Learn together.☆11Oct 11, 2022Updated 3 years ago
- ☆12Jun 26, 2023Updated 2 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Jan 14, 2023Updated 3 years ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆599Jul 15, 2024Updated last year
- A rewrite of Open Hexagon☆12Feb 21, 2026Updated last week
- A technical companion repository archiving code implementations and research artifacts shared on ResearchGate.☆12Feb 21, 2026Updated last week
- A little bit of help.☆13Jul 25, 2024Updated last year
- ☆11May 17, 2023Updated 2 years ago
- A standard-derived suite of cryptography libraries for the TI-84+ CE graphing calculator.☆14Jan 24, 2026Updated last month
- Identify Azure blobs using a wordlist of account name and container name strings☆45Mar 13, 2025Updated 11 months ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆54Dec 18, 2023Updated 2 years ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- An app that extracts your twitter threads into a downloadable CSV file.☆12Apr 8, 2023Updated 2 years ago
- My cheatsheets☆12Jul 23, 2022Updated 3 years ago
- Three different shellcode techniques on the Windows Kernel☆15Apr 8, 2025Updated 10 months ago
- This repo stores something about reverse engineering technique fundemental☆15Jan 16, 2023Updated 3 years ago
- A simple proof-of-concept ARP Spoofing package☆12Nov 24, 2011Updated 14 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- MCP Server for Snyk Security Scanning☆15Feb 23, 2025Updated last year
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- How to create an OS from scratch☆12Jan 22, 2020Updated 6 years ago
- A script for the MPV media player that allows you to view PDF files☆12Nov 18, 2018Updated 7 years ago
- ☆11Nov 29, 2024Updated last year
- study the kernel data structures and its API☆13May 10, 2022Updated 3 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Analyzing patent network data by downloading patentsview.org into MongoDB☆14Jun 21, 2022Updated 3 years ago
- A Windows 11 Rootkit. (Exploit has been patched)☆16Sep 7, 2025Updated 5 months ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago