yuvatia / Win10GdiExploitationView external linksLinks
Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.
☆24Jan 23, 2018Updated 8 years ago
Alternatives and similar repositories for Win10GdiExploitation
Users that are interested in Win10GdiExploitation are comparing it to the libraries listed below
Sorting:
- Windows device tree walker☆15Sep 19, 2018Updated 7 years ago
- 驱动层拦截web访问源码☆30Apr 2, 2018Updated 7 years ago
- hooking KiUserApcDispatcher☆25Apr 3, 2017Updated 8 years ago
- Wechat PC Open More [PC 微信 多开 Demo]☆10Dec 20, 2018Updated 7 years ago
- Microsoft Edge Microsoft Edge主页算法☆20Apr 15, 2019Updated 6 years ago
- POC and exploitation of vulnerabilities☆91Mar 22, 2022Updated 3 years ago
- Hook IDT vector 0xb2 to detect SCI in 64bit windows.☆34Aug 27, 2022Updated 3 years ago
- This is the first software system, which can detect a stealthy hypervisor and calculate several nested ones even under countermeasures.☆87Jun 16, 2015Updated 10 years ago
- a frame of amd-v svm nest☆53Apr 7, 2020Updated 5 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Mar 22, 2017Updated 8 years ago
- HAXM hypervisor client☆18Nov 30, 2018Updated 7 years ago
- ☆19Jul 20, 2015Updated 10 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- ☆29Sep 18, 2015Updated 10 years ago
- exploit termdd.sys(support kb4499175)☆61Jul 15, 2019Updated 6 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- Windows_OS_Internals_Curriculum_Resource_Kit-ACADEMIC☆27Nov 17, 2018Updated 7 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆110Apr 24, 2020Updated 5 years ago
- windbg plugin for win32k debugging☆75Oct 14, 2019Updated 6 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- Different ways to get the HDD Serial☆39Apr 7, 2018Updated 7 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 7 years ago
- ☆14Feb 14, 2018Updated 8 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- ☆29Jan 15, 2021Updated 5 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Nov 26, 2016Updated 9 years ago
- Diff tool for comparing export tables in PE images☆24Mar 4, 2020Updated 5 years ago
- windows 系统API C++封装库,包含进程间通讯,互斥,内存队列等通用功能☆55Aug 25, 2016Updated 9 years ago
- 进程行为分析工具☆14May 21, 2017Updated 8 years ago
- Final Transparent encrypted version☆14Jan 10, 2017Updated 9 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆57Jun 21, 2020Updated 5 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆59Jan 11, 2017Updated 9 years ago
- ☆22May 25, 2017Updated 8 years ago
- The Demo for CVE-2018-1000006☆40Jan 25, 2018Updated 8 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- ☆14Apr 7, 2018Updated 7 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago