zeze-zeze / NamedPipeMasterLinks
a tool used to analyze and monitor in named pipes
☆172Updated 9 months ago
Alternatives and similar repositories for NamedPipeMaster
Users that are interested in NamedPipeMaster are comparing it to the libraries listed below
Sorting:
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆197Updated 4 months ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆136Updated last year
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆134Updated last month
- ☆177Updated last year
- Windows KASLR bypass using prefetch side-channel☆114Updated last year
- Vulnerable driver research tool, result and exploit PoCs☆198Updated last year
- ☆31Updated last year
- Some of my windows kernel exploits for learning purposes☆130Updated 3 years ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆285Updated 4 months ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆57Updated 3 months ago
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆62Updated 8 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 7 months ago
- CVE-2024-30090 - LPE PoC☆107Updated 9 months ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- ☆71Updated 2 years ago
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆108Updated last week
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆102Updated this week
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆117Updated last year
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆229Updated 3 years ago
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆137Updated 7 months ago
- Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)☆72Updated 10 months ago
- ☆49Updated 4 months ago
- Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)☆32Updated last month
- Repo with different exploits & PoCs☆64Updated 2 months ago
- ☆121Updated 11 months ago
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆188Updated last month
- Exploitable drivers, you know what I mean☆151Updated last year
- Admin to Kernel code execution using the KSecDD driver☆253Updated last year
- Recon 2023 slides and code☆79Updated 2 years ago