waleedassar / RestrictedKernelLeaksLinks
☆164Updated 4 years ago
Alternatives and similar repositories for RestrictedKernelLeaks
Users that are interested in RestrictedKernelLeaks are comparing it to the libraries listed below
Sorting:
- ☆148Updated 2 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆94Updated 3 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆244Updated 3 years ago
- Static Binary Instrumentation tool for Windows x64 executables☆207Updated last month
- Unofficial Common Log File System (CLFS) Documentation☆184Updated 4 years ago
- Kernel Exploits☆260Updated 4 years ago
- MalUnpack companion driver☆98Updated last year
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆232Updated 2 years ago
- Helper idapython code for reversing kmdf drivers☆74Updated 3 years ago
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆145Updated 2 years ago
- Windows Kernel Programming☆132Updated 5 years ago
- APC Internals Research Code☆168Updated 5 years ago
- Abusing exceptions for code execution.☆113Updated 2 years ago
- ☆118Updated 5 years ago
- ☆122Updated 5 years ago
- Some of my windows kernel exploits for learning purposes☆134Updated 3 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆236Updated 6 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆211Updated 5 years ago
- This utility allows you to lock every available memory regions of an arbitrary process into its working set.☆69Updated 2 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 4 years ago
- Binary Ninja plugin for exploring Structured Exception Handlers☆82Updated last year
- Code Injection, Inject malicious payload via pagetables pml4.☆242Updated 4 years ago
- Report and exploit of CVE-2023-36427☆89Updated last year
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆190Updated 4 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆58Updated 3 years ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆86Updated 5 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆247Updated 3 years ago
- ☆90Updated 5 years ago
- BYOVD: Loading dbk64.sys and grabbing a handle to it☆160Updated 3 years ago
- Windows LPE exploit for CVE-2022-37969☆136Updated 2 years ago