Stars
Macro-header for compile-time C obfuscation (tcc, win x86/x64)
Disable PatchGuard and Driver Signature Enforcement at boot time
Hook system calls on Windows by using Kaspersky's hypervisor
Simple password/cookies/history/bookmarks stealer/dumper for chrome all version (includes 80+), microsoft edge browser,includes all chromium based browsers, and all gecko based browser (firefox etc.).
Collection of Windows Privilege Escalation (Analyse/PoC/Exploit)
CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
Information from Microsoft about the PDB format. We'll try to keep this up to date. Just trying to help the CLANG/LLVM community get onto Windows.
Credential Guard Bypass Via Patching Wdigest Memory
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
Offensive Software Exploitation Course
This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.
Microsoft Patch Tuesday Security Reports
🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
A repository for learning various heap exploitation techniques.
Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.
Small and highly portable detection tests based on MITRE's ATT&CK.
Resources for Windows exploit development
📡 PoC auto collect from GitHub.
Examples of leaking Kernel Mode information from User Mode on Windows
Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)