xct / windows-kernel-exploits
Some of my windows kernel exploits for learning purposes
☆123Updated 2 years ago
Alternatives and similar repositories for windows-kernel-exploits:
Users that are interested in windows-kernel-exploits are comparing it to the libraries listed below
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆116Updated this week
- Windows LPE exploit for CVE-2022-37969☆134Updated last year
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆226Updated 2 years ago
- ☆97Updated 3 years ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆127Updated last year
- Windows KASLR bypass using prefetch side-channel☆89Updated 11 months ago
- Static Binary Instrumentation tool for Windows x64 executables☆201Updated 2 weeks ago
- ☆105Updated 9 months ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆129Updated 11 months ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆114Updated 11 months ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆148Updated last year
- ☆145Updated last year
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆162Updated 2 years ago
- Detect strange memory regions and DLLs☆183Updated 3 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 2 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆109Updated 7 months ago
- ☆178Updated last year
- LPE exploit for CVE-2023-36802☆22Updated last year
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆99Updated last year
- Analysis of the vulnerability☆51Updated last year
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆226Updated 2 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆221Updated last year
- ☆159Updated 3 years ago
- ☆50Updated 6 years ago
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆51Updated this week
- ☆73Updated 9 months ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆116Updated 5 months ago
- Exploitable drivers, you know what I mean☆132Updated last year
- Admin to Kernel code execution using the KSecDD driver☆244Updated last year