Cih2001 / String-ObfuscatorLinks
☆23Updated 5 years ago
Alternatives and similar repositories for String-Obfuscator
Users that are interested in String-Obfuscator are comparing it to the libraries listed below
Sorting:
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- ☆18Updated 4 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆27Updated 2 years ago
- ☆59Updated 3 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 3 years ago
- ☆21Updated 8 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆58Updated 4 years ago
- Example for PagedOut!☆25Updated 6 years ago
- Detours implementation (x64/x86) which used only ntdll import☆90Updated 3 months ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆30Updated 4 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆26Updated 2 years ago
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆62Updated 2 years ago
- A kernel mode Windows rootkit in development.☆49Updated 4 years ago
- windows rootkit☆60Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated 2 years ago
- Dynamically generated obfuscated jumps and/or function calls☆38Updated 2 years ago
- Lightweight Portable Executable parsing library and a demo peParser application.☆80Updated 3 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆46Updated 3 years ago
- Abusing exceptions for code execution.☆113Updated 3 years ago
- Designed to learn OS specific anti-emulation patterns by fuzzing the Windows API.☆99Updated 5 years ago
- allowing um r/w through km from um ioctl ™☆11Updated 4 years ago
- ☆31Updated 4 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆96Updated 4 years ago
- ☆118Updated 3 years ago
- Yet another windows syscall library☆18Updated 5 years ago
- A simple tool for detecting memory modifications to Windows API.☆23Updated last year
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Updated 4 years ago
- Yet another Windows DLL injector.☆40Updated 4 years ago
- Load Dll into Kernel space☆39Updated 3 years ago