0xStarlight / OS-Lab
This repository serves as a guided resource for completing the OS Lab Sem 5 course at NIT Calicut, providing comprehensive solutions for the practical exercises. It assists students in understanding the development of an operating system from the ground up
☆12Updated last year
Related projects ⓘ
Alternatives and complementary repositories for OS-Lab
- A simple php webshell☆11Updated last year
- A collection of cybersecurity resources☆12Updated 3 weeks ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆11Updated last year
- Trojan written in C++ for Windows☆12Updated 7 months ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆14Updated 8 months ago
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆12Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆18Updated 9 months ago
- Multi-Purpose Cobalt Strike Aggressor Script for streamlined reconnaissance.☆10Updated 9 months ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Updated 7 months ago
- Tomcat backdoor based on CS blog☆25Updated last year
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆14Updated 4 months ago
- ☆10Updated 3 months ago
- A simple website to act as a store for havoc modules and extensions☆22Updated 5 months ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆20Updated 3 months ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆34Updated last year
- ☆12Updated 3 months ago
- ☆11Updated 11 months ago
- Beacon Object Files used for Cobalt Strike☆17Updated last year
- Check for the existence of an email on Google platforms☆12Updated 7 months ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆36Updated last month
- Analyzes AdminSDHolder permissions & compares with a previous run, to detect potential backdoor/excessive persistent permission(s)☆14Updated 11 months ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆30Updated last year
- A simple rpc2socks alternative in pure Go.☆23Updated 4 months ago
- Tool for obtaining information about PPL processes☆16Updated 8 months ago
- Proof of Concept for WatchGuard Authenticated Arbitrary File Read (CVE-2022-31749)☆10Updated 2 years ago
- Atlassian Confluence - Remote Code Execution☆9Updated 9 months ago
- ☆9Updated this week
- MajorDoMo Unauthenticated RCE: Deep Dive & Exploitation Techniques☆14Updated 10 months ago
- Cobalt Strike BOFS☆16Updated 10 months ago
- ManageEngine ADManager Command Injection☆12Updated last year