Previously-0day exploit from the Hacking Team leak, written by Eugene Ching/Qavar.
☆205Jul 21, 2015Updated 10 years ago
Alternatives and similar repositories for hacking-team-windows-kernel-lpe
Users that are interested in hacking-team-windows-kernel-lpe are comparing it to the libraries listed below
Sorting:
- A Swiss Army Knife for Windows Exploit Development.☆41Apr 12, 2016Updated 9 years ago
- Some tools to monitor BillGates CnC servers☆137Apr 14, 2014Updated 11 years ago
- use docker to attack web as a demo☆86Mar 24, 2016Updated 9 years ago
- Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)☆194Mar 10, 2019Updated 6 years ago
- Windows Software Exploitation☆136Feb 14, 2017Updated 9 years ago
- ☆71Nov 29, 2016Updated 9 years ago
- PoC Javascript that scans your local network when you open a webpage☆159May 27, 2016Updated 9 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- Win32k LPE vulnerability used in APT attack☆291Dec 18, 2017Updated 8 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- system scanner☆222Apr 6, 2022Updated 3 years ago
- Stealth DLL injector☆90Jul 26, 2024Updated last year
- Windows kernel vulnerability in win32k.sys Driver☆35Dec 6, 2015Updated 10 years ago
- ☆174Sep 6, 2020Updated 5 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- Beebeeto FrameWork☆257Jul 27, 2015Updated 10 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Oct 14, 2014Updated 11 years ago
- An analytical debugger programmed in C++, using Qt.☆22May 20, 2012Updated 13 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- It is a hack tool kit for pentest and web security research.☆517Oct 2, 2020Updated 5 years ago
- MS15-076 Privilege Escalation☆101Sep 21, 2015Updated 10 years ago
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆415Jan 2, 2020Updated 6 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- ☆63Apr 13, 2017Updated 8 years ago
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 10 years ago
- Proof of concept for CVE-2015-7547☆546Feb 20, 2016Updated 10 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Simple library to spray the Windows Kernel Pool☆110Jan 6, 2020Updated 6 years ago
- ☆315May 22, 2016Updated 9 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI☆42Feb 13, 2017Updated 9 years ago
- ☆118Mar 8, 2020Updated 5 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- Windows Malware☆39Apr 17, 2013Updated 12 years ago
- Mallory - MiTM TCP and UDP Proxy☆322Jun 16, 2022Updated 3 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago