exploit termdd.sys(support kb4499175)
☆61Jul 15, 2019Updated 6 years ago
Alternatives and similar repositories for exploit-RemoteDesktopServerDriver
Users that are interested in exploit-RemoteDesktopServerDriver are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆34Jul 28, 2018Updated 7 years ago
- Microsoft Edge Microsoft Edge主页算法☆20Apr 15, 2019Updated 6 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- Proof of concept of VMSA-2017-0012☆41Jul 27, 2017Updated 8 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- vmware-backdoor☆33Jul 11, 2021Updated 4 years ago
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- ☆17Mar 3, 2016Updated 10 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- ☆39Oct 29, 2020Updated 5 years ago
- Windows 10 CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM☆118Dec 12, 2019Updated 6 years ago
- ☆116Oct 1, 2019Updated 6 years ago
- a frame of amd-v svm nest☆53Apr 7, 2020Updated 5 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- easy to use vtable hook with RTTI support☆23Nov 12, 2019Updated 6 years ago
- 基于WinDivert实现的一个包过滤与截断程序☆13Jul 22, 2018Updated 7 years ago
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- by others☆40Jan 28, 2018Updated 8 years ago
- Hook IDT vector 0xb2 to detect SCI in 64bit windows.☆34Aug 27, 2022Updated 3 years ago
- Windows Console Monitor☆34Jun 11, 2019Updated 6 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆105May 14, 2020Updated 5 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Jan 23, 2018Updated 8 years ago
- ☆10Aug 16, 2019Updated 6 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆94Feb 24, 2019Updated 7 years ago
- ☆125May 23, 2020Updated 5 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆56Jun 9, 2018Updated 7 years ago
- 驱动层拦截web访问源码☆30Apr 2, 2018Updated 7 years ago
- Reverse engineered source code of the autochk rootkit☆210Nov 1, 2019Updated 6 years ago
- POC for a race condition exploit using directory junctions in Windows☆17Apr 26, 2020Updated 5 years ago
- You don't need install any wdk for development kernel driver☆24Jul 20, 2018Updated 7 years ago
- Kernel Pool Monitor☆128Mar 6, 2022Updated 4 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- Rapid generation ShellCode☆60Sep 12, 2017Updated 8 years ago
- windows LPC library☆44Jun 7, 2013Updated 12 years ago
- Some garbage drivers written for getting started☆65Dec 31, 2019Updated 6 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago