There are no reviews yet. Be the first to send feedback to the community and the maintainers!
WindowsExploitationResources
Resources for Windows exploit developmentAuto-Elevate
Escalate from a low-integrity Administrator account to NT AUTHORITY\SYSTEM without an LPE exploit by combining a COM UAC bypass and Token ImpersonationOSCE
Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation for the Offsec CTP/OSCE certificationJektor
A Windows user-mode shellcode execution tool that demonstrates various techniques that malware usesKernel-exploits
Collection of Windows kernel driver exploits targeting various third-party drivers, exploits vary in vulnerability classDrvLoader
A post exploitation utility for loading signed kernel drivers using both the undocumented NtLoadDriver function and by directly interfacing with the Windows Service Control Manager (SCM)FileGuard
File crypter and packing utilitype-Parser
A lightweight utility for parsing PE file formats (EXE, DLL, SYS) written in C/C++Win10InfoLeaks
Windows kernel information leakage POCs on Windows 10 RS1+AntiDebugging
Anti-debugger and anti-reverse engineering techniquesHEVD-Kernel-Stack-BOF-SMEP-Win10-64bit-1607
A Windows Kernel LPE exploit for HEVD.sys targeting a stack overflow vulnerability on Windows 10 64-bit 1607 (RS1)WindowsToolkit
Small suite of various utilities using Windows APIKernel-dev
Random code snippets related to kernel code developmentCVE-2020-5509
Car Rental Project v.1.0 Remote Code ExecutionLsassMiniDumpWriteDump
Create a MiniDump for lsass.exeLove Open Source and this site? Check out how you can help us