0x1-1 / krn-rw-ioctlView external linksLinks
simple driver to read and write
☆18Apr 13, 2025Updated 10 months ago
Alternatives and similar repositories for krn-rw-ioctl
Users that are interested in krn-rw-ioctl are comparing it to the libraries listed below
Sorting:
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- ☆20Mar 15, 2023Updated 2 years ago
- ☆16Oct 31, 2022Updated 3 years ago
- a dkom rootkit that targets windows x64 systems. the rootkit hooks and edits criticl memory sections in order to hide different resources…☆18Jul 5, 2023Updated 2 years ago
- This is a simple project of a driver + usermode.☆170Jan 31, 2022Updated 4 years ago
- A VMBR (Virtual-Machine Based Rootkit) which runs a guest OS and sends the attacker its data☆28Apr 27, 2024Updated last year
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆11Aug 8, 2022Updated 3 years ago
- https://www.youtube.com/watch?v=qsjGj_L1kyo☆10Jul 29, 2021Updated 4 years ago
- UM-KM Communication using registry callbacks☆39Jun 8, 2020Updated 5 years ago
- Repository of different kernel drivers written while studying Windows NT Driver development☆12Apr 14, 2024Updated last year
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Dec 20, 2022Updated 3 years ago
- md5 encryption example☆10Jan 31, 2022Updated 4 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago
- ☆26Sep 29, 2022Updated 3 years ago
- ☆10Oct 3, 2016Updated 9 years ago
- Source code on the 1.44MB 3.5 floppy accompanying the Windows NT File System Internals book.☆20Jul 31, 2019Updated 6 years ago
- Walks through the 4-level paging structures in Windows x64☆13Feb 12, 2023Updated 3 years ago
- ☆51Jan 9, 2021Updated 5 years ago
- ☆33Dec 22, 2020Updated 5 years ago
- allowing um r/w through km from um ioctl ™☆11Jan 2, 2022Updated 4 years ago
- Packet Injection With WFP☆16Feb 20, 2023Updated 2 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- Hooking Heavens Gate in a weekend☆13Jan 1, 2022Updated 4 years ago
- A proof-of-concept DLL that prints out the password a user enters into Veracrypt while decrypting a volume.☆15Oct 26, 2018Updated 7 years ago
- ☆17Apr 21, 2022Updated 3 years ago
- ☆15Mar 13, 2023Updated 2 years ago
- An example code of CiGetCertPublisherName☆17Mar 24, 2022Updated 3 years ago
- a tiny code that performs kernel-mode read/write using CVE-2023-38817.☆18Mar 28, 2025Updated 10 months ago
- IO隐藏通信封装☆17May 31, 2021Updated 4 years ago
- Easily read and write process memory on windows 🧠☆11Nov 1, 2022Updated 3 years ago
- ☆11Oct 24, 2022Updated 3 years ago
- ☆17Apr 18, 2023Updated 2 years ago
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- Kernel driver that .text hooks a syscall in dxgkrnl.sys which can be called from our user-mode client to send instructions like rpm/wpm a…☆204Dec 16, 2022Updated 3 years ago
- Simple dll injector that uses thread hijacking to execute the payload☆12Jul 7, 2022Updated 3 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆14May 13, 2020Updated 5 years ago
- Manually perform syscalls without going through any external API or DLL.☆19Apr 19, 2023Updated 2 years ago
- Async rust support for the reverse-engineered Crowdstrike Falcon protocol between the Sensor and cloud services☆17Mar 10, 2023Updated 2 years ago