waleedassar / CVE-2021-24098
POC for CVE-2021-24098
☆13Updated 4 years ago
Alternatives and similar repositories for CVE-2021-24098
Users that are interested in CVE-2021-24098 are comparing it to the libraries listed below
Sorting:
- ☆23Updated 4 years ago
- ☆11Updated 3 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Updated 6 months ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- POC for CVE-2021-1699☆16Updated 4 years ago
- ☆14Updated 5 years ago
- Collection of IDA helpers☆16Updated 2 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Updated 5 years ago
- AppContainerBypass☆21Updated 4 years ago
- Subtract one PE file from another!☆22Updated 3 years ago
- POC For CVE-2022-24483☆14Updated 3 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆31Updated 9 years ago
- Using Thread Description To Hide Shellcodes☆14Updated 2 years ago
- KernelBugTest☆15Updated 7 years ago
- Resources from my journey into Windows binary exploitation☆22Updated 6 years ago
- scripting IDA like a Pro☆24Updated 4 years ago
- ☆11Updated 6 years ago
- Dump mapped PE files from memory to the disk☆20Updated 5 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆22Updated 8 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆15Updated last year
- Easily hook WIN32 x64 functions☆18Updated 2 months ago
- ☆33Updated 3 years ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- ☆11Updated 3 years ago
- This is a POC for loading shared object directly from memory without accessing the actual Linux file system.☆22Updated 4 years ago
- TrojanDropper/PS.Maloader.d☆12Updated 3 years ago
- ☆11Updated 4 years ago
- ☆15Updated 6 years ago
- A kernel mode Windows rootkit in development.☆48Updated 3 years ago
- Tools for analyzing Windows containers and break container's isolation☆31Updated 2 years ago