A library to develop kernel level Windows payloads for post HVCI era
☆506May 18, 2021Updated 5 years ago
Alternatives and similar repositories for KernelForge
Users that are interested in KernelForge are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code Injection, Inject malicious payload via pagetables pml4.☆244Jul 7, 2021Updated 4 years ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆666Jan 28, 2025Updated last year
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆906Nov 21, 2019Updated 6 years ago
- Kernel Driver Utility☆2,549May 7, 2026Updated last week
- UEFI bootkit for driver manual mapping☆595Jan 1, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆256Jul 5, 2022Updated 3 years ago
- Browse Page Tables on Windows (Page Table Viewer)☆239Apr 2, 2022Updated 4 years ago
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,218Jun 17, 2022Updated 3 years ago
- C++ STL in the Windows Kernel with C++ Exception Support☆435Aug 16, 2023Updated 2 years ago
- Disks for DMA☆153Apr 28, 2021Updated 5 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆83Dec 21, 2022Updated 3 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆348Apr 27, 2020Updated 6 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆331Oct 13, 2024Updated last year
- Easy Anti PatchGuard☆221Apr 9, 2021Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆261Sep 1, 2022Updated 3 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆269Aug 31, 2022Updated 3 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆639Jul 7, 2017Updated 8 years ago
- Windows kernel hacking framework, driver template, hypervisor and API written on C++☆1,812Nov 12, 2023Updated 2 years ago
- Internals information about Hyper-V☆739May 6, 2026Updated 2 weeks ago
- HyperDeceit is the ultimate all-in-one library that emulates Hyper-V for Windows, giving you the ability to intercept and manipulate oper…☆381Jun 3, 2023Updated 2 years ago
- Hooking Windows' exception dispatcher to protect process's PML4☆246Jan 24, 2025Updated last year
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆150Mar 2, 2023Updated 3 years ago
- ☆165Sep 18, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆274Mar 16, 2026Updated 2 months ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆242Nov 6, 2019Updated 6 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,293Apr 2, 2026Updated last month
- ☆370May 11, 2025Updated last year
- ☆228Mar 11, 2023Updated 3 years ago
- Turn off PatchGuard in real time for win7 (7600) ~ later☆1,039Apr 21, 2022Updated 4 years ago
- A collection of various vulnerable (mostly physical memory exposing) drivers.☆466Jun 15, 2022Updated 3 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆396Jul 6, 2022Updated 3 years ago
- nmi stackwalking + module verification☆169Dec 28, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The Grimoire Hypervisor solution for x86 Processors with experimental nested virtualization support. Remastering with Rust in progress.☆631May 9, 2026Updated last week
- Lua in kernel-mode because why not.☆370Dec 3, 2021Updated 4 years ago
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆594Jan 24, 2023Updated 3 years ago
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆398Aug 8, 2021Updated 4 years ago
- Hook system calls, context switches, page faults and more.☆2,649May 9, 2023Updated 3 years ago
- KSOCKET provides a very basic example how to make a network connections in the Windows Driver by using WSK☆545Sep 2, 2022Updated 3 years ago
- A native hypervisor designed for the Windows operating system☆125Mar 6, 2021Updated 5 years ago