Cr4sh / KernelForge
A library to develop kernel level Windows payloads for post HVCI era
☆384Updated 3 years ago
Alternatives and similar repositories for KernelForge:
Users that are interested in KernelForge are comparing it to the libraries listed below
- Research on Windows Kernel Executive Callback Objects☆284Updated 4 years ago
- A more stealthy variant of "DLL hollowing"☆337Updated 11 months ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆571Updated 2 weeks ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆201Updated 3 years ago
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆342Updated 3 months ago
- System call hook for Windows 10 20H1☆486Updated 3 years ago
- Debugger Anti-Detection Benchmark☆305Updated last year
- Code Injection, Inject malicious payload via pagetables pml4.☆229Updated 3 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆209Updated 5 years ago
- Windows NT x64 syscall fuzzer☆593Updated last year
- Asynchronous Procedure Calls☆214Updated 3 years ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆851Updated 5 years ago
- Analyze patches in a process☆249Updated 3 years ago
- Browse Page Tables on Windows (Page Table Viewer)☆193Updated 2 years ago
- SimpleSvmHook is a research purpose hypervisor for Windows on AMD processors.☆372Updated 3 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆265Updated 2 years ago
- This is a collection of interesting codes about Windows Process creation.☆231Updated last year
- This project provides a collection of Microsoft Windows kernel structures, unions and enumerations. Most of them are not officially docum…☆189Updated last week
- UEFI bootkit for driver manual mapping☆532Updated last year
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆527Updated last month
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆269Updated 4 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆243Updated 2 years ago
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆273Updated last year
- APC Internals Research Code☆161Updated 4 years ago
- Enumerating and removing kernel callbacks using signed vulnerable drivers☆548Updated 2 years ago
- X86 Mutation Engine with Portable Executable compatibility.☆479Updated 2 years ago
- Inline syscalls made easy for windows on clang☆690Updated 7 months ago
- A DTrace on Windows Reimplementation☆338Updated last week
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆220Updated 4 years ago
- BYOVD: Loading dbk64.sys and grabbing a handle to it☆147Updated 2 years ago