zeze-zeze / WindowsKernelVulnLinks
☆56Updated 2 years ago
Alternatives and similar repositories for WindowsKernelVuln
Users that are interested in WindowsKernelVuln are comparing it to the libraries listed below
Sorting:
- This repo contains EXPs about Vulnerable Windows Driver☆46Updated last year
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆106Updated 4 years ago
- ☆36Updated 7 months ago
- ☆30Updated last year
- Windows LPE exploit for CVE-2022-37969☆135Updated last year
- ☆61Updated last year
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆50Updated 2 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆68Updated 3 years ago
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆118Updated 2 years ago
- Finding Truth in the Shadows☆107Updated 2 years ago
- ☆31Updated last year
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆63Updated 9 months ago
- spoof return address☆76Updated 2 years ago
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆71Updated 3 years ago
- PoC capable of detecting manual syscalls from usermode.☆197Updated 7 months ago
- ☆11Updated 5 months ago
- HackSysExtremeVulnerableDriver exploits for latest Windows 10 version☆25Updated 3 years ago
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆111Updated 3 years ago
- Remove WPP calls from hexrays decompiled code☆49Updated 2 months ago
- ☆76Updated 3 months ago
- Report and exploit of CVE-2023-36427☆90Updated last year
- Call NtCreateUserProcess directly as normal.☆71Updated 3 years ago
- Exploit for eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆39Updated last week
- Hook all callbacks which are registered with LdrRegisterDllNotification☆87Updated 2 months ago
- Windows KASLR bypass using prefetch side-channel☆102Updated last year
- CVE-2022-3699 with arbitrary kernel code execution capability☆71Updated 2 years ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.☆53Updated 4 months ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆57Updated 3 years ago
- obfacros - a set of C++ macros that can be used to obfuscate your c/c++ code, to make executables harder for reverse-engineering.☆46Updated 6 years ago