GitHub / Exploitables 13 Repositories
Just a wanna-be hacker.
Exploitables/Filter-Breaker
A simple mini-filter fuzzer.
Language: C - Size: 8.79 KB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 1 - Forks: 0

Exploitables/Exploitables
Yes! Maybe? No.
Size: 50.8 KB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 1 - Forks: 0

Exploitables/DeviceTree-Exploit-LPE
Reference: https://github.com/kasif-dekel/OSR_DeviceTree_Vuln
Language: C - Size: 7.81 KB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 4 - Forks: 2

Exploitables/CVE-2018-3990-TALOS-2018-0658
An exploitable pool corruption vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400). A specially crafted IRP request can cause a buffer overflow, resulting in kernel memory corruption and, potentially, privilege escalation. An attacker can send an IRP request to trigger this vulnerability.
Language: C - Size: 11.7 KB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 1 - Forks: 0

Exploitables/CVE-2019-18845
The MsIo64.sys and MsIo32.sys drivers in Patriot Viper RGB before 1.1 allow local users (including low integrity processes) to read and write to arbitrary memory locations, and consequently gain NT AUTHORITY\SYSTEM privileges, by mapping \Device\PhysicalMemory into the calling process via ZwOpenSection and ZwMapViewOfSection.
Language: C - Size: 7.81 KB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 4 - Forks: 1

Exploitables/Fortknox-Firewall-DoS
Information disclosure exploit in Fortknox Firewall 9.0.305. This appears to be a zero day?
Language: C - Size: 6.84 KB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 2 - Forks: 1

Exploitables/Kernel-Base-Address-Leaker
A simple program utilizing "NtQuerySystemInformation" to leak kernel addresses. Easy!
Language: C - Size: 8.79 KB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 6 - Forks: 1

Exploitables/CapRoot
I wanted to write up an exploit, so I wrote up my own for Capcom.
Language: C - Size: 26.4 KB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 3 - Forks: 0

Exploitables/CVE-2021-44852
An issue was discovered in BS_RCIO64.sys in Biostar RACING GT Evo 2.1.1905.1700. A low-integrity process can open the driver's device object and issue IOCTLs to read or write to arbitrary physical memory locations (or call an arbitrary address), leading to execution of arbitrary code. This is associated with 0x226040, 0x226044, and 0x226000.
Language: C - Size: 22.5 KB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 8 - Forks: 0

Exploitables/MSRC-2
MSRC-2 proof-of-concept.
Language: C - Size: 548 KB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 2 - Forks: 0

Exploitables/MSRC-1
MSRC-1 proof-of-concept.
Language: C - Size: 66.4 KB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 4 - Forks: 0

Exploitables/Open-Exploitation-1
For those who want to get an idea of what EXP-301 is about. This is NOT the official course.
Size: 88.9 KB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 9 - Forks: 0

Exploitables/Gigabyte-Driver-Exploit
Blah blah blah you used a public DoS poc to make this blah blah blah. I don't give a shit.
Language: C - Size: 12.7 KB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 6 - Forks: 0

Exploitables/CVE-2020-17382
The MSI AmbientLink MsIo64 driver 1.0.0.8 has a Buffer Overflow (0x80102040, 0x80102044, 0x80102050,and 0x80102054).
Language: C - Size: 7.81 KB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 3 - Forks: 0

Exploitables/CVE-2009-0824
new exploit YIPEEEE
Language: C - Size: 6.84 KB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 2 - Forks: 0

Exploitables/HEVD-Exploits
A collection of HackSys Extreme Vulnerable Driver exploits. Previous repository was deleted to forcefully remove commits containing sensitive information. Sorry!
Language: C - Size: 67.4 KB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 6 - Forks: 2

Exploitables/Windows-Pool-Structures
My love for learning Windows internals continues.
Language: C - Size: 33.2 KB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 15 - Forks: 2

Exploitables/CVE-2015-2291
(1) IQVW32.sys before 1.3.1.0 and (2) IQVW64.sys before 1.3.1.0 in the Intel Ethernet diagnostics driver for Windows allows local users to cause a denial of service or possibly execute arbitrary code with kernel privileges via a crafted (a) 0x80862013, (b) 0x8086200B, (c) 0x8086200F, or (d) 0x80862007 IOCTL call.
Language: C - Size: 291 KB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 9 - Forks: 2

Exploitables/ExFreePool-Vulnerability
My research into taking advantage of ExFreePool primitives.
Language: C - Size: 537 KB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 6 - Forks: 2

Exploitables/WinRing0-Code-Base-Exploit
A fun but failed experiment.
Language: C - Size: 19.5 KB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 3 - Forks: 2

Exploitables/WinRing0-MSR-Exploit
I came back to this exploit, and finished off what I wanted to do all along.
Language: C - Size: 24.4 KB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 12 - Forks: 4

Exploitables/MS15-117
An elevation of privilege vulnerability exists when NDIS fails to check the length of a buffer prior to copying memory into it. An attacker who successfully exploited this vulnerability could gain elevated privileges on a targeted system.
Language: C - Size: 8.79 KB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 3 - Forks: 2

Exploitables/Open-Exploitation-2
For those who want to get an idea of what EXP-401 is about. This is NOT the official course.
Size: 8.79 KB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 3 - Forks: 0

Exploitables/CVE-2009-4049
Heap-based buffer overflow in aswRdr.sys (aka the TDI RDR driver) in avast! Home and Professional 4.8.1356.0 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted arguments to IOCTL 0x80002024.
Language: C - Size: 8.79 KB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 1 - Forks: 1

Exploitables/CVE-2021-27965
The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 has a buffer overflow that allows privilege escalation via a crafted 0x80102040, 0x80102044, 0x80102050, or 0x80102054 IOCTL request.
Language: C - Size: 9.77 KB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 1 - Forks: 1

Exploitables/windowsserverdocs Fork of MicrosoftDocs/windowsserverdocs
Public content repository for Windows Server 2016 content.
Size: 862 MB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 0 - Forks: 0

Exploitables/CVE-2010-4502
Integer overflow in KmxSbx.sys 6.2.0.22 in CA Internet Security Suite Plus 2010 allows local users to cause a denial of service (pool corruption) and execute arbitrary code via crafted arguments to the 0x88000080 IOCTL, which triggers a buffer overflow.
Language: C - Size: 53.7 KB - Last synced at: over 2 years ago - Pushed at: almost 3 years ago - Stars: 0 - Forks: 0

Exploitables/IOCTL-Explosion
A fast driver IOCTL fuzzer that I wrote.
Language: C - Size: 48.8 KB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 3 - Forks: 0

Exploitables/Write-Ups
A repository containing links to every write-up I ever made.
Size: 1000 Bytes - Last synced at: over 2 years ago - Pushed at: about 3 years ago - Stars: 1 - Forks: 0
