zeze-zeze / 2023iThomeLinks
☆41Updated last year
Alternatives and similar repositories for 2023iThome
Users that are interested in 2023iThome are comparing it to the libraries listed below
Sorting:
- ☆62Updated 2 years ago
- ☆32Updated 2 years ago
- 2021 iThome 鐵人賽☆52Updated 2 months ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆109Updated 4 years ago
- Windows x86 PE Packer In C++☆52Updated 6 years ago
- ☆11Updated 4 years ago
- ☆61Updated 2 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆166Updated 4 years ago
- This repo contains EXPs about Vulnerable Windows Driver☆47Updated last year
- https://key08.com/index.php/2021/10/19/1375.html☆71Updated 3 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆58Updated 4 years ago
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆77Updated 4 years ago
- ☆22Updated 11 months ago
- A simple example application to collect DNS queries logs using etw-api☆25Updated 5 years ago
- Windows LPE exploit for CVE-2022-37969☆136Updated 2 years ago
- Call NtCreateUserProcess directly as normal.☆75Updated 3 years ago
- An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit☆24Updated 4 years ago
- POC about how to prevent windbg break☆15Updated 3 years ago
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.☆35Updated 3 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆75Updated last year
- A simple but useful project maybe help you reverse Windows.☆41Updated last year
- Remove WPP calls from hexrays decompiled code☆54Updated 8 months ago
- ☆29Updated last year
- HackSysExtremeVulnerableDriver exploits for latest Windows 10 version☆26Updated last week
- obfacros - a set of C++ macros that can be used to obfuscate your c/c++ code, to make executables harder for reverse-engineering.☆46Updated 6 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆19Updated 5 years ago
- win32kbase!NtDCompositionCommitSynchronizationObject and win32kbase!NtGdiGetCertificate☆16Updated 4 years ago
- windows rpc 使用MIDL+RPC实现HelloWorld☆23Updated 7 years ago
- fork from A-Protect☆10Updated 7 years ago
- Exploitable drivers, you know what I mean☆154Updated last month