Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.
☆24Jan 23, 2018Updated 8 years ago
Alternatives and similar repositories for Win10GdiExploitation
Users that are interested in Win10GdiExploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows device tree walker☆15Sep 19, 2018Updated 7 years ago
- Microsoft Edge Microsoft Edge主页算法☆20Apr 15, 2019Updated 6 years ago
- 驱动层拦截web访问源码☆30Apr 2, 2018Updated 7 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Mar 22, 2017Updated 9 years ago
- POC and exploitation of vulnerabilities☆91Mar 22, 2022Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- hooking KiUserApcDispatcher☆27Apr 3, 2017Updated 8 years ago
- ☆29Sep 18, 2015Updated 10 years ago
- Wechat PC Open More [PC 微信 多开 Demo]☆10Dec 20, 2018Updated 7 years ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- windbg plugin for win32k debugging☆75Oct 14, 2019Updated 6 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆99Nov 26, 2016Updated 9 years ago
- a frame of amd-v svm nest☆53Apr 7, 2020Updated 5 years ago
- Driver utilities for building static analysis and other command-line tools.☆23Nov 28, 2022Updated 3 years ago
- Hook IDT vector 0xb2 to detect SCI in 64bit windows.☆34Aug 27, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆147Jul 30, 2017Updated 8 years ago
- CVE-2019-0859 1day Exploit☆119Feb 11, 2020Updated 6 years ago
- This is the first software system, which can detect a stealthy hypervisor and calculate several nested ones even under countermeasures.☆87Jun 16, 2015Updated 10 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- Different ways to get the HDD Serial☆39Apr 7, 2018Updated 7 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆266Jul 6, 2017Updated 8 years ago
- Windows_OS_Internals_Curriculum_Resource_Kit-ACADEMIC☆27Nov 17, 2018Updated 7 years ago
- Diff tool for comparing export tables in PE images☆24Mar 4, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- r0akmap is a PoC driver manual mapper based on r0ak☆37Aug 18, 2018Updated 7 years ago
- handle elevation using bedaisy.☆12Aug 17, 2020Updated 5 years ago
- WinDbg debugger extension library providing various tools to analyse, dump and fix (restore) Microsoft Portable Executable files for both…☆84Aug 24, 2024Updated last year
- exploit termdd.sys(support kb4499175)☆61Jul 15, 2019Updated 6 years ago
- kernel pool windbg extension☆83Jul 23, 2015Updated 10 years ago
- ☆19Jul 20, 2015Updated 10 years ago
- HAXM hypervisor client☆18Nov 30, 2018Updated 7 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆109Apr 24, 2020Updated 5 years ago
- Slides of 44Con 2018☆23Oct 11, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 8 years ago
- Simple library to spray the Windows Kernel Pool☆110Jan 6, 2020Updated 6 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆58Jun 21, 2020Updated 5 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- ☆125May 23, 2020Updated 5 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Aug 8, 2018Updated 7 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago