zeze-zeze / NamedPipeMasterLinks
a tool used to analyze and monitor in named pipes
☆193Updated last year
Alternatives and similar repositories for NamedPipeMaster
Users that are interested in NamedPipeMaster are comparing it to the libraries listed below
Sorting:
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆164Updated 3 weeks ago
- ☆189Updated last year
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆147Updated last year
- Shellcode IDE — makes developing and analyzing shellcode much more convenient.☆107Updated last month
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆88Updated last month
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆225Updated 8 months ago
- CVE-2025-50168 Exploit PoC — Pwn2Own Berlin 2025 - LPE(Windows 11) winning bug.☆132Updated last month
- Windows KASLR bypass using prefetch side-channel☆172Updated last year
- ☆32Updated 2 years ago
- Vulnerable driver research tool, result and exploit PoCs☆225Updated 2 years ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆420Updated 3 weeks ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆126Updated last year
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆63Updated 8 months ago
- Some of my windows kernel exploits for learning purposes☆134Updated 3 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆124Updated last year
- Windows Win32 Kernel Subsystem☆35Updated 4 months ago
- ☆85Updated 4 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 11 months ago
- LPE exploit for CVE-2023-36802☆24Updated 2 years ago
- Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)☆49Updated 6 months ago
- CVE-2024-30090 - LPE PoC☆107Updated last year
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆135Updated this week
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆246Updated 3 years ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆322Updated 2 months ago
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆65Updated last year
- Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)☆79Updated last year
- ☆74Updated last year
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆264Updated last year
- ☆122Updated last year
- A Windows Named Pipe Multi-tool / Proxy☆202Updated 3 weeks ago