My articles for Paged Out! #2
☆17Nov 20, 2019Updated 6 years ago
Alternatives and similar repositories for PagedOut2
Users that are interested in PagedOut2 are comparing it to the libraries listed below
Sorting:
- ☆21Jan 7, 2019Updated 7 years ago
- executing JS from x86 code☆27May 9, 2019Updated 6 years ago
- Undocumented NsiAllocateAndGetTable usage in GetTcpTableInternal reverse engineered on Win7 X64☆20Apr 7, 2018Updated 7 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Windows DLL Loading Utility☆12Jun 11, 2020Updated 5 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆62Nov 18, 2020Updated 5 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Kernel mode windows NT API logger☆22Sep 9, 2019Updated 6 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 6 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- Open-source SMB filesystem driver for Windows☆49Oct 27, 2019Updated 6 years ago
- Allows you to parse all messages sent to DbgPrint without any process interaction.☆32Apr 8, 2020Updated 5 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 6 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Figuring out the cause of a handle downgrade☆24Dec 13, 2022Updated 3 years ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 6 years ago
- ShellcodeVM☆15Jun 20, 2016Updated 9 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- ☆69Dec 17, 2020Updated 5 years ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- exploit development☆49Mar 14, 2018Updated 8 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- Windows Console Monitor☆34Jun 11, 2019Updated 6 years ago
- Self-modifying Code de-obfuscation☆17May 17, 2017Updated 8 years ago
- POC viruses I have created to demo some ideas☆59Apr 12, 2020Updated 5 years ago
- ☆17Feb 29, 2020Updated 6 years ago
- Library for using direct system calls☆35Jan 30, 2025Updated last year
- ☆90Oct 17, 2020Updated 5 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- ☆16Dec 14, 2017Updated 8 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Mar 30, 2019Updated 6 years ago
- HAXM hypervisor client☆18Nov 30, 2018Updated 7 years ago
- ☆151Updated this week
- Window Executable file Function tracer using Debugging API☆44Sep 26, 2019Updated 6 years ago