windows-kernel-exploits
amd-ryzen-master-driver-v17-exploit
windows-kernel-exploits | amd-ryzen-master-driver-v17-exploit | |
---|---|---|
7 | 1 | |
7,712 | 130 | |
0.0% | - | |
0.0 | 10.0 | |
almost 3 years ago | over 1 year ago | |
C | C | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
windows-kernel-exploits
-
Ask HN: Do you use any software (mainly) developed in China?
This is a big one for me:
https://github.com/SecWiki/windows-kernel-exploits
Zoomeye, the chinese shodan is ok too.
- Windows Kernel Exploits
-
Offsec.tools – A vast collection of security tools
I tried ctrl+f couldn't find the two things I found invaluable. It really needs a search function especially for us mobile users without a nice mouse wheel.
Anyway, the two things I can vouch for are "windows exploit suggester" and this chinese repo: https://github.com/SecWiki/windows-kernel-exploits
Of course I assume Linpeas/Winpeas is there. You belong in an insane asylum if you left them out of any list like this.
- There’s a GitHub repo for testing every single Windows security / privilege mechanism. I’ve lost the book mark, anyone know it?
- Need help with Privilege Escalation
-
Just started lab a bit tough
https://github.com/SecWiki/windows-kernel-exploits Has helped me out and definitely suggest Linux exploit suggester and win and lin peas
amd-ryzen-master-driver-v17-exploit
What are some alternatives?
CVE-2020-0796 - CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
CrossC2 - generate CobaltStrike's cross-platform payload
h-encore - Fully chained kernel exploit for the PS Vita on firmwares 3.65-3.68
nanodump - The swiss army knife of LSASS dumping
HardeningKitty - HardeningKitty - Checks and hardens your Windows configuration
ScreenshotBOF - An alternative screenshot capability for Cobalt Strike that uses WinAPI and does not perform a fork & run. Screenshot downloaded in memory.
sqlite-gui - Lightweight SQLite editor for Windows
WindowSpy - WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.
WSAAcceptBackdoor - Winsock accept() Backdoor Implant.
CS-Situational-Awareness-BOF - Situational Awareness commands implemented using Beacon Object Files
uuid-loader - UUID based Shellcode loader for your favorite C2
bof-launcher - Beacon Object File (BOF) launcher - library for executing BOF files in C/C++/Zig applications