3itch / icekit
I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit
☆14Updated 3 weeks ago
Alternatives and similar repositories for icekit:
Users that are interested in icekit are comparing it to the libraries listed below
- ☆20Updated 3 months ago
- uefi diskless persistence technique + OVMF secureboot bypass☆61Updated 11 months ago
- This repo for Windows x32-x64 Kernel/Driver/User Mode Exploitation writeups and exploits☆23Updated 10 months ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆64Updated 2 weeks ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆26Updated 7 months ago
- A journal for $6,000 Riot Vanguard bounty.☆62Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆106Updated 6 months ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆121Updated 3 weeks ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆98Updated last year
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆33Updated last year
- ☆34Updated 3 weeks ago
- Signature finder (from PE-bear)☆36Updated 9 months ago
- Mentally ill EtwTi parser☆35Updated last week
- a demo module for the kaine agent to execute and inject assembly modules☆38Updated 7 months ago
- OFFZONE 2024 Malware Persistence workshop☆19Updated 3 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆31Updated last year
- A few examples of how to trap virtual memory access on Windows.☆28Updated 3 months ago
- using the gpu to hide your payload☆56Updated 2 years ago
- Callstack spoofing using a VEH because VEH all the things.☆19Updated last week
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 3 years ago
- ☆70Updated 2 years ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Updated 2 years ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆42Updated 8 months ago
- ☆29Updated last month
- Native Powers Talk demos☆14Updated last year
- ☆34Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆26Updated 5 years ago
- Splitting and executing shellcode across multiple pages☆100Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆20Updated last month
- Debug-assisted Argument Spoofing☆14Updated 5 months ago