The HackSys Extreme Vulnerable Driver (HEVD) is a Windows Kernel driver intentionally designed with various vulnerabilities, from simple stack buffer overflows to complex issues like use-after-free and race conditions, to help security researchers and enthusiasts enhance their skills in kernel-level exploitation.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A technology lookup and lead generation tool that identifies the technology stack of any website and provides features for market research, competitor analysis, and data enrichment.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
APKiD is a tool that identifies compilers, packers, obfuscators, and other weird stuff in APK files.
ThreatLocker is an enterprise cybersecurity platform that provides comprehensive endpoint protection and zero-trust security to prevent ransomware, viruses, and other malicious software from running on endpoints.
A PHP port of Rack::Honeypot, a spam trap that detects and blocks spambots
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.
A tool for detecting capabilities in executable files, providing insights into a program's behavior and potential malicious activities.
A brute-force protection middleware for express routes that rate-limits incoming requests.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.