waleedassar / CVE-2021-1699Links
POC for CVE-2021-1699
☆16Updated 4 years ago
Alternatives and similar repositories for CVE-2021-1699
Users that are interested in CVE-2021-1699 are comparing it to the libraries listed below
Sorting:
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Updated 7 months ago
- Execute an arbitrary command within the context of another process☆20Updated 5 years ago
- ☆14Updated 5 years ago
- Resources from my journey into Windows binary exploitation☆22Updated 6 years ago
- ☆12Updated 5 years ago
- Using Thread Description To Hide Shellcodes☆14Updated 2 years ago
- ☆31Updated 4 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆22Updated 5 years ago
- Proof of Concept code for CVE-2020-0728☆46Updated 5 years ago
- ☆12Updated 3 years ago
- Files for http://deniable.org/windows/windows-callbacks☆25Updated 4 years ago
- Quarantine bypass and RCE vulnerability in Sketch (proof-of-concept)☆12Updated 3 years ago
- Self-Loading Registration Free COM Functions☆11Updated 5 years ago
- Simple .NET profiler shellcode loader☆10Updated 3 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- Example for PagedOut!☆24Updated 5 years ago
- ☆24Updated 3 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Updated 6 years ago
- ☆11Updated 3 years ago
- POC For CVE-2022-24483☆14Updated 3 years ago
- ☆26Updated 3 years ago
- CVE-2020-1048 bypass: binary planting PoC☆32Updated 4 years ago
- A kernel mode Windows rootkit in development.☆48Updated 3 years ago
- Green shellcode challenge tools☆22Updated 6 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Updated 4 years ago
- KernelBugTest☆15Updated 7 years ago
- ☆21Updated 4 years ago
- TrojanDropper/PS.Maloader.d☆12Updated 3 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16Updated 3 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago